*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: reportbug

CVE-2008-2230 description:

"Untrusted search path vulnerability in (1) reportbug 3.8 and 3.31, and
(2) reportbug-ng before 0.2008.06.04, allows local users to execute
arbitrary code via a malicious module file in the current working
directory."

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2230

Debian reportbug bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311
Debian reportbug-ng bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474

** Affects: reportbug (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: reportbug-ng (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: reportbug (Debian)
     Importance: Unknown
         Status: Unknown

** Affects: reportbug-ng (Debian)
     Importance: Unknown
         Status: Unknown

** Visibility changed to: Public

** Also affects: reportbug-ng (Ubuntu)
   Importance: Undecided
       Status: New

** Bug watch added: Debian Bug tracker #484311
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311

** Also affects: reportbug (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311
   Importance: Unknown
       Status: Unknown

** Bug watch added: Debian Bug tracker #484474
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474

** Also affects: reportbug-ng (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474
   Importance: Unknown
       Status: Unknown

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-2230

-- 
[CVE-2008-2230] Arbitrary code execution by preparing module files in os.curdir
https://bugs.launchpad.net/bugs/239124
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to