CVE-2012-3479 in Emacs
摘要 (英语)
lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
预定
2012-06-14
披露
2012-08-25
状态
已确认
条目
VulDB provides additional information and datapoints for this CVE:
| 标识符 | 漏洞 | CWE | 可利用 | 对策 | CVE |
|---|---|---|---|---|---|
| 61791 | GNU Emacs 远程代码执行 | 未定义 | 未定义 | CVE-2012-3479 |