First published: Mon Sep 22 2008(Updated: )
emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3949 has a moderate severity rating due to its potential to allow arbitrary code execution through malicious Python files.
To fix CVE-2008-3949, update Emacs to version 22.3 or later, which addresses the vulnerability.
CVE-2008-3949 affects users of Emacs versions 22.1 and 22.2 on systems that allow execution of locally stored Python files.
CVE-2008-3949 is classified as a code execution vulnerability allowing local users to execute undesired Python scripts.
CVE-2008-3949 was publicly disclosed in September 2008.