Vulnerability Name:

CVE-2002-0014 (CCN-7822)

Assigned:1999-11-17
Published:1999-11-17
Updated:2016-10-18
Summary:URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&).
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-1999-036.0
remote attack on pine users

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-02:05
pine port insecure URL handling [REVISED]

Source: CCN
Type: BugTraq Mailing List, Wed, 17 Nov 1999 18:23:20 -0500
Pine: expanding env vars in URLs (seems to be fixed as of 4.21)

Source: CCN
Type: BugTraq Mailing List, Fri Jan 04 2002 - 20:17:16 CST
Pine 4.33 (at least) URL handler allows embedded commands.

Source: CCN
Type: Hewlett-Packard Company Security Bulletin HPSBTL0201-015
Updated pine packages are available

Source: MITRE
Type: CNA
CVE-2000-0352

Source: MITRE
Type: CNA
CVE-2002-0014

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:460

Source: CCN
Type: Conectiva Linux Announcement CLA-2002:460
pine

Source: BUGTRAQ
Type: UNKNOWN
20020105 Pine 4.33 (at least) URL handler allows embedded commands.

Source: CCN
Type: RHSA-2002-009
Updated pine packages are available

Source: REDHAT
Type: Patch
RHSA-2002:009

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20020114-002
'pine' URL handling vulnerability

Source: CCN
Type: OSVDB ID: 1142
Pine URL Environment Variable Expansion Arbitrary Command Execution

Source: CCN
Type: OSVDB ID: 5404
Pine URL Handling Single Quote Arbitrary Command Execution

Source: BID
Type: UNKNOWN
3815

Source: CCN
Type: BID-3815
Pine Environment Variable URL Shell Interpreting Vulnerability

Source: CCN
Type: BID-810
Pine Environment Variable Expansion in URLS Vulnerability

Source: CCN
Type: SuSE Security Announcement #36
pine-4.10

Source: CCN
Type: University of Washington Web site
Changes from Pine 4.43 to 4.44

Source: HP
Type: UNKNOWN
HPSBTL0201-015

Source: XF
Type: UNKNOWN
pine-url-handler-commands(7822)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:university_of_washington:pine:4.20:*:*:*:*:*:*:*
  • OR cpe:/a:university_of_washington:pine:4.21:*:*:*:*:*:*:*
  • OR cpe:/a:university_of_washington:pine:4.30:*:*:*:*:*:*:*
  • OR cpe:/a:university_of_washington:pine:4.33:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:caldera:openlinux:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    university_of_washington pine 4.20
    university_of_washington pine 4.21
    university_of_washington pine 4.30
    university_of_washington pine 4.33
    caldera openlinux 2.3
    redhat linux 6.2
    suse suse linux 6.3
    freebsd ports collection *
    redhat linux 7
    engardelinux secure community 1.0.1
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3