Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-0035


Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.


Published

2012-01-19T15:55:00.943

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application eric_m_ludlam cedet ≤ 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application eric_m_ludlam cedet 1.0 Yes
Application gnu emacs ≤ 23.3 Yes
Application gnu emacs 20.0 Yes
Application gnu emacs 20.1 Yes
Application gnu emacs 20.2 Yes
Application gnu emacs 20.3 Yes
Application gnu emacs 20.4 Yes
Application gnu emacs 20.5 Yes
Application gnu emacs 20.6 Yes
Application gnu emacs 20.7 Yes
Application gnu emacs 21 Yes
Application gnu emacs 21.1 Yes
Application gnu emacs 21.2 Yes
Application gnu emacs 21.2.1 Yes
Application gnu emacs 21.3 Yes
Application gnu emacs 21.3.1 Yes
Application gnu emacs 21.4 Yes
Application gnu emacs 22.1 Yes
Application gnu emacs 22.2 Yes
Application gnu emacs 22.3 Yes
Application gnu emacs 23.1 Yes
Application gnu emacs 23.2 Yes
Application gnu emacs 23.4 Yes

References