First published: Mon Jan 26 2009(Updated: )
Untrusted search path vulnerability in dia's Python plug-in alows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. References: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251</a> Test case and more discussion about this issue (and reason's why it can't be fixed in Python is available at): <a href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html">http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html</a> Proposed patch: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Dia | ||
CPython |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-481551 is classified as a high-severity vulnerability due to its potential for executing arbitrary code.
To fix REDHAT-BUG-481551, ensure that the environment is properly configured to prevent the execution of untrusted Python files.
Users of Dia and Python, particularly local users, are affected by REDHAT-BUG-481551.
REDHAT-BUG-481551 is an untrusted search path vulnerability that allows local execution of arbitrary code.
The implications of REDHAT-BUG-481551 include potential unauthorized access and manipulation of systems by executing malicious code.