Vulnerability Description
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gentoo | Portage | <= 2.1.4.4 |
References
- http://secunia.com/advisories/32228Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200810-02.xml
- http://www.securityfocus.com/bid/31670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45792
- http://secunia.com/advisories/32228Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200810-02.xml
- http://www.securityfocus.com/bid/31670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45792
FAQ
What is CVE-2008-4394?
CVE-2008-4394 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modif...
How severe is CVE-2008-4394?
CVE-2008-4394 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-4394?
Check the references section above for vendor advisories and patch information. Affected products include: Gentoo Portage.