7.2
CVSSv2

CVE-2008-0302

Published: 17/01/2008 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges prior to 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian apt-listchanges

Vendor Advisories

Felipe Sateler discovered that apt-listchanges did not use safe paths when importing additional Python libraries A local attacker could exploit this and execute arbitrary commands as the user running apt-listchanges ...
Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries This could allow the execution of arbitrary shell commands if the root user executed the command in a directory which other local users may write to For the old stable distribution (sarge), this problem ...