Lucene search

K
freebsdFreeBSDC1E5F35E-F93D-11E1-B07F-00235A5F2C9A
HistoryAug 13, 2012 - 12:00 a.m.

emacs -- remote code execution vulnerability

2012-08-1300:00:00
vuxml.freebsd.org
20

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.0%

Chong Yidong reports:

Paul Ling has found a security flaw in the file-local
variables code in GNU Emacs.
When the Emacs user option enable-local-variables' is set to :safe’ (the default value is t), Emacs should
automatically refuse to evaluate eval' forms in file-local variable sections. Due to the bug, Emacs instead automatically evaluates such eval’ forms. Thus, if the user
changes the value of enable-local-variables' to :safe’,
visiting a malicious file can cause automatic execution of
arbitrary Emacs Lisp code with the permissions of the
user.
The bug is present in Emacs 23.2, 23.3, 23.4, and
24.1.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchemacs< 24.2UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.0%