Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-8606

Опубликовано: 11 окт. 2016
Источник: redhat
CVSS3: 8.3
CVSS2: 5.1
EPSS Низкий

Описание

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

A vulnerability was found in guile's REPL server (--listen), making it vulnerable to HTTP inter-protocol attacks. A crafted website, when visited by a developer with an instance of the REPL server, could cause arbitrary code execution within the guile scheme interpreter.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5guileNot affected
Red Hat Enterprise Linux 6guileNot affected
Red Hat Enterprise Linux 7guileWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1383972guile: REPL server vulnerable to HTTP inter-protocol attacks

EPSS

Процентиль: 56%
0.0034
Низкий

8.3 High

CVSS3

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

CVSS3: 9.8
nvd
около 9 лет назад

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

CVSS3: 9.8
debian
около 9 лет назад

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to e ...

CVSS3: 9.8
github
больше 3 лет назад

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

EPSS

Процентиль: 56%
0.0034
Низкий

8.3 High

CVSS3

5.1 Medium

CVSS2