First published: Mon Oct 05 2015(Updated: )
Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <=3.5.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-5652 is classified as moderate due to the potential for local privilege escalation.
To fix CVE-2015-5652, ensure that Python is upgraded to a version higher than 3.5.0.
Users of Python through version 3.5.0 on Windows systems are affected by CVE-2015-5652.
CVE-2015-5652 is an untrusted search path vulnerability.
CVE-2015-5652 cannot be exploited remotely; it requires local access to execute code.