CVE-2007-2027

Published Apr 13, 2007

Last updated 7 years ago

Overview

Description
Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
4.4
Impact score
6.4
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-134

Evaluator

Comment
-
Impact
An untrusted message catalog might lead to a format-string attack when an attacker tricks user into launching links from a particular directory.
Solution
An untrusted message catalog might lead to a format-string attack when an attacker tricks user into launching links from a particular directory.

Vendor comments

  • Red HatThis issue affected Red Hat Enterprise Linux 4 and 5. Update packages were released to correct it via: http://rhn.redhat.com/errata/RHSA-2009-1471.html

Configurations