6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
python is vulnerable to arbitrary code execution. It was found that many applications embedding the Python interpreter did not specify a valid full path to the script or application when calling the PySys_SetArgv API function, which could result in the addition of the current working directory to the module search path (sys.path). A local attacker able to trick a victim into running such an application in an attacker-controlled directory could use this flaw to execute code with the victimβs privileges. This update adds the PySys_SetArgvEx API. Developers can modify their applications to use this new API, which sets sys.argv without modifying sys.path.
lists.fedoraproject.org/pipermail/package-announce/2010-June/042751.html
secunia.com/advisories/34522
secunia.com/advisories/40194
secunia.com/advisories/42888
secunia.com/advisories/50858
secunia.com/advisories/51024
secunia.com/advisories/51040
secunia.com/advisories/51087
security.gentoo.org/glsa/glsa-200903-41.xml
security.gentoo.org/glsa/glsa-200904-06.xml
www.mail-archive.com/[email protected]/msg586010.html
www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
www.openwall.com/lists/oss-security/2009/01/26/2
www.openwall.com/lists/oss-security/2009/01/28/5
www.openwall.com/lists/oss-security/2009/01/30/2
www.redhat.com/support/errata/RHSA-2011-0027.html
www.ubuntu.com/usn/USN-1596-1
www.ubuntu.com/usn/USN-1613-1
www.ubuntu.com/usn/USN-1613-2
www.ubuntu.com/usn/USN-1616-1
www.vupen.com/english/advisories/2010/1448
www.vupen.com/english/advisories/2011/0122
access.redhat.com/errata/RHSA-2011:0027
access.redhat.com/security/updates/classification/#low
bugzilla.redhat.com/show_bug.cgi?id=482814