|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-3068: eric code execution | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVE-2005-3068: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ludwig Nussel
2005-10-21 10:00:50 UTC
2 local non-root user -1 extra package +1 default active -1 user interaction +1 command execution Total Score: 2 (Low) Added the patch for the packages of 9.0, 9.1/sles9, 9.2, 9.3 and 10.0. STABLE is not affected as it has version 3.7.2 which already includes the fix. Is my conclusion right that project files for eric contain python code? When you click to open them eric basically executes what's inside? The fix only prevents certain functions from beeing executed? after taking a closer look I came to the conclusion that this issue is fubar. We will not release a security update. CVE-2005-3068: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) |