Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000021

Опубликовано: 09 фев. 2018
Источник: debian
EPSS Низкий

Описание

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gitunfixedpackage

Примечания

  • http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html

  • Terminal emulators need to perform proper escaping

EPSS

Процентиль: 58%
0.00372
Низкий

Связанные уязвимости

CVSS3: 5
ubuntu
почти 8 лет назад

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

CVSS3: 5
redhat
около 8 лет назад

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

CVSS3: 5
nvd
почти 8 лет назад

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

CVSS3: 8.8
github
больше 3 лет назад

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

EPSS

Процентиль: 58%
0.00372
Низкий