CVE-2008-4394
Published Oct 10, 2008
Last updated 7 years ago
Overview
- Description
- Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gentoo:portage:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF07C844-F3BF-4B64-9067-019011E752E0", "versionEndIncluding": "2.1.4.4" }, { "criteria": "cpe:2.3:a:gentoo:portage:2.0.51.22:r3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1A333DF-BC3A-4DDE-A5E3-41FF1EBD78A4" }, { "criteria": "cpe:2.3:a:gentoo:portage:2.1.1:r2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8469FBB-223E-43B5-8708-B984E72A683F" }, { "criteria": "cpe:2.3:a:gentoo:portage:2.1.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F663C7AD-8AEF-4C78-A501-FC72C49F9ADE" }, { "criteria": "cpe:2.3:a:gentoo:portage:2.1.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CA86E5F-4496-4485-99B7-24BB4EDEEAE0" } ], "operator": "OR" } ] } ]