CVE-2012-3479
8 documents7 sources
Severity
6.8MEDIUM
EPSS
2.3%
top 15.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 25
Latest updateMay 17
Description
lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages1 packages
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
1📋Vendor Advisories
2💬Community
2Bugzilla▶
CVE-2012-3479 emacs: Evaluation of 'eval' forms in file-local variable sections, when 'enable-local-variables' set to ':safe' [fedora-all]↗2012-08-13
Bugzilla▶
CVE-2012-3479 emacs: Evaluation of 'eval' forms in file-local variable sections, when 'enable-local-variables' set to ':safe'↗2012-08-13