Bug 487704 (CVE-2009-0367)
Summary: | CVE-2009-0367 wesnoth: Python AI sandbox permits arbitrary code execution | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | gwync, nathelbiya, vdanen, vinodhyd4u, wtogami |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-19 09:02:57 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Tomas Hoger
2009-02-27 15:11:59 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0367 to the following vulnerability: Name: CVE-2009-0367 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0367 Assigned: 20090129 Reference: CONFIRM: http://www.wesnoth.org/forum/viewtopic.php?t=24247 Reference: CONFIRM: http://www.wesnoth.org/forum/viewtopic.php?t=24340 Reference: CONFIRM: https://gna.org/bugs/index.php?13048 Reference: SECUNIA:34058 Reference: URL: http://secunia.com/advisories/34058 Reference: VUPEN:ADV-2009-0595 Reference: URL: http://www.vupen.com/english/advisories/2009/0595 The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module. As there is now Wesnoth 1.6 in f10, that can be marked as fixed, I think. |