Vulnerability Description
lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Emacs | 23.2 |
References
- http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00057.html
- http://secunia.com/advisories/50157Vendor Advisory
- http://secunia.com/advisories/50801
- http://www.debian.org/security/2013/dsa-2603
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:076
- http://www.openwall.com/lists/oss-security/2012/08/13/1Patch
- http://www.openwall.com/lists/oss-security/2012/08/13/2
- http://www.securityfocus.com/bid/54969
- http://www.securitytracker.com/id?1027375
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slack
- http://www.ubuntu.com/usn/USN-1586-1
- http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00057.html
- http://secunia.com/advisories/50157Vendor Advisory
FAQ
What is CVE-2012-3479?
CVE-2012-3479 is a vulnerability with a CVSS score of 6.8 (MEDIUM). lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote...
How severe is CVE-2012-3479?
CVE-2012-3479 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3479?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Emacs.