|
Test ID: | 1.3.6.1.4.1.25623.1.0.63402 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDVSA-2009:039 (gedit) |
Summary: | Mandrake Security Advisory MDVSA-2009:039 (gedit) |
Description: | Description: The remote host is missing an update to gedit announced via advisory MDVSA-2009:039. Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current gedit working directory (CVE-2009-0314). This update provides fix for that vulnerability. Affected: 2008.1, 2009.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2009:039 CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0314 http://www.openwall.com/lists/oss-security/2009/01/26/2 http://bugzilla.gnome.org/show_bug.cgi?id=569214 https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01195.html http://security.gentoo.org/glsa/glsa-200903-41.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:039 BugTraq ID: 33445 http://www.securityfocus.com/bid/33445 http://secunia.com/advisories/33759 http://secunia.com/advisories/33769 http://secunia.com/advisories/34522 XForce ISS Database: gedit-pysyssetargv-privilege-escalation(48271) https://exchange.xforce.ibmcloud.com/vulnerabilities/48271 |
Copyright | Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|