- Description
- Untrusted search path vulnerability in the installation functionality in ActivePython 3.2.2.3, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Python27 or C:\Python27\Scripts directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the ActivePython installation
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
CVSS 3.1
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 5.9
- Exploitability score
- 1.3
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 10
- Exploitability score
- 1.5
- Vector string
- AV:L/AC:H/Au:S/C:C/I:C/A:C
- Hype score
- Not currently trending
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'
- Impact
- -
- Solution
- -
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:activestate:activepython:3.2.2.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FE5C9601-DFD1-4666-B5B8-F31CD81C27F4"
}
],
"operator": "OR"
}
]
}
]