CVE Vulnerabilities

CVE-2007-2027

Use of Externally-Controlled Format String

Published: Apr 13, 2007 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
4.4 LOW
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a ../po directory, which can be leveraged to conduct format string attacks.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
ElinksElinks0.11.1 (including)0.11.1 (including)
Red Hat Enterprise Linux 4RedHatelinks-0:0.9.2-4.el4_8.1*
Red Hat Enterprise Linux 5RedHatelinks-0:0.11.1-6.el5_4.1*
ElinksUbuntudapper*
ElinksUbuntudevel*
ElinksUbuntuedgy*
ElinksUbuntufeisty*

Potential Mitigations

References