Lucene search

K
gentooGentoo FoundationGLSA-201401-31
HistoryJan 27, 2014 - 12:00 a.m.

CEDET: Privilege escalation

2014-01-2700:00:00
Gentoo Foundation
security.gentoo.org
12

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

51.1%

Background

CEDET is a Collection of Emacs Development Environment Tools written with the end goal of creating an advanced development environment in Emacs.

Description

An untrusted search path vulnerability was discovered in CEDET.

Impact

A local attacker could escalate his privileges via a specially crafted Lisp expression in a Project.ede file in the directory or a parent directory of an opened file.

Workaround

There is no known workaround at this time.

Resolution

All CEDET users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emacs/cedet-1.0.1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since February 01, 2012. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-emacs/cedet< 1.0.1UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

51.1%