Vulnerability Details : CVE-2008-2142
Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2008-2142
Probability of exploitation activity in the next 30 days: 0.38%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-2142
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2008-2142
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0177
-
http://thread.gmane.org/gmane.emacs.devel/96903
Exploit
-
http://tracker.xemacs.org/XEmacs/its/issue378
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:154
-
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00782.html
-
http://www.securityfocus.com/bid/29176
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:153
-
https://issues.rpath.com/browse/RPL-2529
-
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00736.html
-
https://bugs.gentoo.org/show_bug.cgi?id=221197
-
http://www.securityfocus.com/archive/1/492657/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42362
- http://security.gentoo.org/glsa/glsa-200902-06.xml
-
http://www.vupen.com/english/advisories/2008/1540/references
-
http://lists.gnu.org/archive/html/emacs-devel/2008-05/msg00645.html
-
http://www.vupen.com/english/advisories/2008/1539/references
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
-
http://www.securitytracker.com/id?1020019
Products affected by CVE-2008-2142
- cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:xemacs:*:*:*:*:*:*:*:*