CVE-2008-5985 Affecting epiphany-browser package, versions <2.22.3-7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-EPIPHANYBROWSER-277202
- published 28 Jan 2009
- disclosed 28 Jan 2009
Introduced: 28 Jan 2009
CVE-2008-5985 Open this link in a new tabHow to fix?
Upgrade Debian:10 epiphany-browser to version 2.22.3-7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream epiphany-browser package and not the epiphany-browser package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
Untrusted search path vulnerability in the Python interface in Epiphany 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
- https://security-tracker.debian.org/tracker/CVE-2008-5985
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363
- http://www.gentoo.org/security/en/glsa/glsa-200903-16.xml
- http://www.openwall.com/lists/oss-security/2009/01/26/2
- https://bugzilla.redhat.com/show_bug.cgi?id=481548
- http://secunia.com/advisories/34187
- http://www.securityfocus.com/bid/33441
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:048