Vulnerability Name: | CVE-2019-18182 (CCN-176719) | ||||||||||||
Assigned: | 2019-03-02 | ||||||||||||
Published: | 2019-03-02 | ||||||||||||
Updated: | 2021-12-30 | ||||||||||||
Summary: | pacman before 5.2 is vulnerable to arbitrary command injection in conf.c in the download_with_xfercommand() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable a non-default XferCommand and retrieve an attacker-controlled crafted database and package. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-18182 Source: XF Type: UNKNOWN pacman-cve201918182-cmd-exec(176719) Source: CCN Type: pacman GIT Repository run XferCommand via exec Source: MISC Type: Patch, Third Party Advisory https://git.archlinux.org/pacman.git/commit/?id=808a4f15ce82d2ed7eeb06de73d0f313620558ee Source: MISC Type: Exploit, Third Party Advisory https://git.archlinux.org/pacman.git/tree/src/pacman/conf.c?h=v5.1.3#n263 Source: CONFIRM Type: Release Notes, Third Party Advisory https://github.com/alpinelinux/alpine-secdb/blob/master/v3.11/community.yaml Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-781d0b2efe Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-096fbcc91f Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-419a75aef6 Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-18182 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |