4.4
CVSSv2

CVE-2007-2027

Published: 13/04/2007 Updated: 11/10/2017
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

elinks elinks 0.11.1

Vendor Advisories

Arnaud Giersch discovered that elinks incorrectly attempted to load gettext catalogs from a relative path If a user were tricked into running elinks from a specific directory, a local attacker could execute code with user privileges ...
Debian Bug report logs - #380347 elinks: crashes on a specially crafted page Package: elinks; Maintainer for elinks is أحمد المحمودي (Ahmed El-Mahmoudy) <aelmahmoudy@userssourceforgenet>; Source for elinks is src:elinks (PTS, buildd, popcon) Reported by: Jakub Wilk <ubanus@userssfnet> Date: Sat, 29 Ju ...
Debian Bug report logs - #417789 elinks: elinks uses untrusted gettext catalog Package: elinks; Maintainer for elinks is أحمد المحمودي (Ahmed El-Mahmoudy) <aelmahmoudy@userssourceforgenet>; Source for elinks is src:elinks (PTS, buildd, popcon) Reported by: Arnaud Giersch <arnaudgiersch@iut-bmuniv-fcomtefr ...

Exploits

source: wwwsecurityfocuscom/bid/23844/info ELinks is prone to an arbitrary code-execution vulnerability An attacker can exploit this issue to potentially execute arbitrary code with the privileges of the user running the affected application This issue requires an attacker to trick an unsuspecting victim into running the vulnerable ap ...