Vulnerability Details : CVE-2007-5795
The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration.
Products affected by CVE-2007-5795
- cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*When used together with: Debian » Debian Linux
Exploit prediction scoring system (EPSS) score for CVE-2007-5795
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5795
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | AV:L/AC:M/Au:N/C:N/I:C/A:C |
3.4
|
9.2
|
NIST |
Vendor statements for CVE-2007-5795
-
Red Hat 2007-11-09Not vulnerable. This issue did not affect versions of Emacs as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2007-5795
-
http://cvs.savannah.gnu.org/viewvc/emacs/emacs/lisp/files.el?r1=1.896.2.28&r2=1.896.2.29
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/38263
-
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
-
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00524.html
-
http://www.vupen.com/english/advisories/2007/3715
-
http://www.securityfocus.com/bid/26327
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:034
Mandriva
-
http://docs.info.apple.com/article.html?artnum=307562
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449008
-
http://www.ubuntu.com/usn/usn-541-1
-
http://security.gentoo.org/glsa/glsa-200712-03.xml
GNU Emacs: Multiple vulnerabilities (GLSA 200712-03) — Gentoo security
-
http://www.vupen.com/english/advisories/2008/0924/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://bugs.gentoo.org/show_bug.cgi?id=197958
Jump to