Code Execution Vulnerability in GNU Emacs by The GNU Project
CVE-2012-3479
Currently unrated
Summary
The vulnerability in GNU Emacs arises from the 'lisp/files.el' component, where under certain configurations, it can execute eval forms within file-local variable sections. Specifically, when the 'enable-local-variables' option is set to ':safe', it inadvertently enables the execution of potentially malicious Emacs Lisp code, allowing an attacker to leverage crafted files to execute arbitrary commands on a victim's system. This behavior poses a significant risk, particularly when users are tricked into opening files crafted by remote attackers.
References
Timeline
Vulnerability published
Vulnerability Reserved