Executive Summary

Informations
Name CVE-2009-0367 First vendor Publication 2009-03-04
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0367

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13652
 
Oval ID: oval:org.mitre.oval:def:13652
Title: DSA-1737-1 wesnoth -- several vulnerabilities
Description: Several security issues have been discovered in wesnoth, a fantasy turn-based strategy game. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0366 Daniel Franke discovered that the wesnoth server is prone to a denial of service attack when receiving special crafted compressed data. CVE-2009-0367 Daniel Franke discovered that the sandbox implementation for the python AIs can be used to execute arbitrary python code on wesnoth clients. In order to prevent this issue, the python support has been disabled. A compatibility patch was included, so that the affected campagne is still working properly. For the stable distribution, these problems have been fixed in version 1.4.4-2+lenny1. For the oldstable distribution, these problems have been fixed in version 1.2-5. For the testing distribution and the unstable distribution , these problems have been fixed in version 1.4.7-4. We recommend that you upgrade your wesnoth packages.
Family: unix Class: patch
Reference(s): DSA-1737-1
CVE-2009-0366
CVE-2009-0367
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): wesnoth
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8370
 
Oval ID: oval:org.mitre.oval:def:8370
Title: DSA-1737 wesnoth -- several vulnerabilities
Description: Several security issues have been discovered in wesnoth, a fantasy turn-based strategy game. The Common Vulnerabilities and Exposures project identifies the following problems: Daniel Franke discovered that the wesnoth server is prone to a denial of service attack when receiving special crafted compressed data. Daniel Franke discovered that the sandbox implementation for the python AIs can be used to execute arbitrary python code on wesnoth clients. In order to prevent this issue, the python support has been disabled. A compatibility patch was included, so that the affected campagne is still working properly.
Family: unix Class: patch
Reference(s): DSA-1737
CVE-2009-0366
CVE-2009-0367
Version: 3
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 4.0
Product(s): wesnoth
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 19

OpenVAS Exploits

Date Description
2009-03-13 Name : Debian Security Advisory DSA 1737-1 (wesnoth)
File : nvt/deb_1737_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
53877 Wesnoth Python AI Module Hierarchical Module Name Handling Arbitrary Code Exe...

Nessus® Vulnerability Scanner

Date Description
2009-03-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1737.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://launchpad.net/bugs/335089
http://launchpad.net/bugs/336396
http://launchpad.net/bugs/cve/2009-0367
http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/cha...
http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/ch...
http://secunia.com/advisories/34058
http://secunia.com/advisories/34236
http://www.debian.org/security/2009/dsa-1737
http://www.vupen.com/english/advisories/2009/0595
http://www.wesnoth.org/forum/viewtopic.php?t=24247
http://www.wesnoth.org/forum/viewtopic.php?t=24340
https://exchange.xforce.ibmcloud.com/vulnerabilities/49058
https://gna.org/bugs/index.php?13048
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:12:01
  • Multiple Updates
2024-11-28 12:18:12
  • Multiple Updates
2021-05-04 12:09:05
  • Multiple Updates
2021-04-22 01:09:26
  • Multiple Updates
2020-05-23 00:23:18
  • Multiple Updates
2017-08-08 09:24:40
  • Multiple Updates
2016-04-26 18:35:58
  • Multiple Updates
2014-02-17 10:48:39
  • Multiple Updates
2013-05-10 23:43:18
  • Multiple Updates