CVE-2012-3479 in Emacs信息

摘要 (英语)

lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

预定

2012-06-14

披露

2012-08-25

状态

已确认

条目

VulDB provides additional information and datapoints for this CVE:

标识符漏洞CWE可利用对策CVE
61791GNU Emacs 远程代码执行
 
未定义未定义CVE-2012-3479

来源