PT-2012-5961 · Activestate · Activepython
Published
2012-10-11
·
Updated
2025-01-16
·
CVE-2012-5379
7.3
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
ActivePython version 3.2.2.3
Description:
The installation functionality in ActivePython has an untrusted search path vulnerability. This might allow local users to gain privileges via a Trojan horse DLL in the C:Python27 or C:Python27Scripts directory, which may be added to the PATH system environment variable by an administrator. This issue is demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in various Windows versions.
Recommendations:
For ActivePython version 3.2.2.3, consider disabling the installation functionality in the top-level C: directory to minimize the risk of exploitation. Restrict access to the C:Python27 and C:Python27Scripts directories to prevent a Trojan horse DLL from being added to the PATH system environment variable. As a temporary workaround, avoid using the `wlbsctrl.dll` file until a patch is available. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Related Identifiers
Affected Products
References · 5
- 🔥 https://exploit-db.com/exploits/28130 · Exploit
- 🔥 https://htbridge.com/advisory/HTB23108 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2012-5379 · Security Note
- https://t.me/cvenotify/107708 · Telegram Post
- https://t.me/cvenotify/89521 · Telegram Post