Computer Security
[EN] securityvulns.ru no-pyccku


emacs protection bypass
Published:20.08.2012
Source:
SecurityVulns ID:12524
Type:local
Threat Level:
4/10
Description:"enable-local-variables" doesn't work.
CVE:CVE-2012-3479 (lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.)
Original documentdocumentSLACKWARE, [slackware-security] emacs (SSA:2012-228-02) (20.08.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod