CVE-2007-2027
Summary
| CVE | CVE-2007-2027 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-04-13 18:19:00 UTC |
| Updated | 2017-10-11 01:32:00 UTC |
| Description | Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Elinks |
Elinks |
0.11.1 |
All |
All |
All |
| Application |
Elinks |
Elinks |
0.11.1 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| Ubuntu update for elinks - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| ELinks Relative Path Arbitrary Code Execution Vulnerability |
BID |
www.securityfocus.com |
|
| 235411 – (CVE-2007-2027) CVE-2007-2027 elinks tries to load .po files from a non-absolute path |
CONFIRM |
bugzilla.redhat.com |
Exploit, Vendor Advisory |
| ELinks "add_filename_to_string()" Privilege Escalation - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| 2007-0017 |
TRUSTIX |
www.trustix.org |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| USN-457-1: elinks vulnerability | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| #417789 - elinks: elinks uses untrusted gettext catalog - Debian Bug report logs |
CONFIRM |
bugs.debian.org |
|
| Trustix Updates for Multiple Packages - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| ELinks: User-assisted execution of arbitrary code — Gentoo Linux Documentation |
GENTOO |
security.gentoo.org |
|
| Gentoo update for elinks - Secunia.com |
SECUNIA |
secunia.com |
Vendor Advisory |
| 35668 |
OSVDB |
osvdb.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2009-10-02 | Mark J Cox | This issue affected Red Hat Enterprise Linux 4 and 5. Update packages were released to correct it via: http://rhn.redhat.com/errata/RHSA-2009-1471.html |
There are currently no legacy QID mappings associated with this CVE.