Vulnerability Name: | CVE-2019-14868 (CCN-176708) |
Assigned: | 2019-10-01 |
Published: | 2019-10-01 |
Updated: | 2023-02-12 |
Summary: | In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely. |
CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.4 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 6.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-77
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2019-14868
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: Red Hat Bugzilla Bug 1757324 CVE-2019-14868 ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com
Source: XF Type: UNKNOWN att-cve201914868-cmd-exec(176708)
Source: CCN Type: ast GIT Repository Harden env var imports
Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: Apple security document HT211170 About the security content of macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*Configuration RedHat 6: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*Configuration RedHat 7: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*Configuration RedHat 9: cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*Configuration RedHat 10: cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*Configuration RedHat 11: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*Configuration RedHat 12: cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*OR cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |