Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19518

Опубликовано: 25 нояб. 2018
Источник: debian
EPSS Критический

Описание

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.3fixed7.3.0-1package
php7.2removedpackage
php7.0removedpackage
php5removedpackage
uw-imapfixed8:2007f~dfsg-6package

Примечания

  • Fixed in 5.6.39, 7.0.33, 7.1.25, 7.2.13, 7.3.0

  • PHP Bug: https://bugs.php.net/bug.php?id=76428

  • PHP Bug: https://bugs.php.net/bug.php?id=77153

  • PHP Bug: https://bugs.php.net/bug.php?id=77160

  • https://www.openwall.com/lists/oss-security/2018/11/22/3

  • https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb

EPSS

Процентиль: 100%
0.93964
Критический

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 8.1
redhat
больше 6 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 7.5
nvd
больше 6 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

suse-cvrf
больше 6 лет назад

Recommended update for php5

suse-cvrf
больше 6 лет назад

Recommended update for php7

EPSS

Процентиль: 100%
0.93964
Критический