CVE-2008-5983
Published: 27 January 2009
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Priority
Status
Package | Release | Status |
---|---|---|
python2.4 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
python2.5 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
python2.6 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.5+20100529-1)
|
Patches: Upstream: http://hg.python.org/cpython/rev/3f08d98c8fa5/ |
||
python2.7 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.7-1)
|
python3.1 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.1.3-1)
|
Patches: Upstream: http://hg.python.org/cpython/rev/9db8c414921f/ |
||
python3.2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.2)
|
Notes
Author | Note |
---|---|
jdstrand | upstream added new C API function, PySys_SetArgvEx, which can be used to set sys.argv without also modifying sys.path. The default behavior for PySys_SetArgv does not change. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983
- https://usn.ubuntu.com/usn/usn-1596-1
- https://usn.ubuntu.com/usn/usn-1613-1
- https://usn.ubuntu.com/usn/usn-1613-2
- https://usn.ubuntu.com/usn/usn-1616-1
- NVD
- Launchpad
- Debian