Lucene search

K
gentooGentoo FoundationGLSA-200706-03
HistoryJun 06, 2007 - 12:00 a.m.

ELinks: User-assisted execution of arbitrary code

2007-06-0600:00:00
Gentoo Foundation
security.gentoo.org
11

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.7%

Background

ELinks is a text-mode web browser.

Description

Arnaud Giersch discovered that the “add_filename_to_string()” function in file intl/gettext/loadmsgcat.c uses an untrusted relative path, allowing for a format string attack with a malicious .po file.

Impact

A local attacker could entice a user to run ELinks in a specially crafted directory environment containing a malicious “.po” file, possibly resulting in the execution of arbitrary code with the privileges of the user running ELinks.

Workaround

There is no known workaround at this time.

Resolution

All ELinks users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/elinks-0.11.2-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-client/elinks< 0.11.2-r1UNKNOWN

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.7%