Vulnerability Name: | CVE-2018-20969 (CCN-165397) | ||||||||||||||||||||||||
Assigned: | 2018-04-06 | ||||||||||||||||||||||||
Published: | 2018-04-06 | ||||||||||||||||||||||||
Updated: | 2019-09-05 | ||||||||||||||||||||||||
Summary: | do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. Note: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20969 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html Source: REDHAT Type: UNKNOWN RHSA-2019:2798 Source: REDHAT Type: UNKNOWN RHSA-2019:2964 Source: REDHAT Type: UNKNOWN RHSA-2019:3757 Source: REDHAT Type: UNKNOWN RHSA-2019:3758 Source: REDHAT Type: UNKNOWN RHSA-2019:4061 Source: XF Type: UNKNOWN gnupatch-cve201820969-cmd-exec(165397) Source: CCN Type: patch GIT Repository Invoke ed directly instead of using the shell Source: MISC Type: Patch, Vendor Advisory https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 Source: MISC Type: UNKNOWN https://github.com/irsl/gnu-patch-vulnerabilities Source: CCN Type: Packet Storm Security [08-16-2019] GNU patch Command Injection / Directory Traversal Source: BUGTRAQ Type: Exploit, Mailing List, Patch, Third Party Advisory 20190816 Details about recent GNU patch vulnerabilities | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration CCN 1: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |