Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-13638

Опубликовано: 29 июл. 2019
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

A flaw was found in GNU patch through version 2.7.6. An ed-style diff payload patch file with shell metacharacters can be used to inject OS shell commands into a system. The ed editor does not need to be present on the vulnerable system for this attack to function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Red Hat Enterprise Linux 6 is not affected by this vulnerability as the shipped version of patch did not carry the code that introduced this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5patchOut of support scope
Red Hat Enterprise Linux 6patchNot affected
Red Hat Enterprise Linux 7patchFixedRHSA-2019:296403.10.2019
Red Hat Enterprise Linux 7.4 Advanced Update SupportpatchFixedRHSA-2019:406103.12.2019
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportpatchFixedRHSA-2019:406103.12.2019
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionspatchFixedRHSA-2019:406103.12.2019
Red Hat Enterprise Linux 7.5 Extended Update SupportpatchFixedRHSA-2019:375706.11.2019
Red Hat Enterprise Linux 7.6 Extended Update SupportpatchFixedRHSA-2019:375806.11.2019
Red Hat Enterprise Linux 8patchFixedRHSA-2019:279819.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1733916patch: OS shell command injection when processing crafted patch files

EPSS

Процентиль: 87%
0.03286
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
nvd
около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVSS3: 7.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
около 6 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection th ...

CVSS3: 7.8
github
больше 3 лет назад

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

EPSS

Процентиль: 87%
0.03286
Низкий

7.8 High

CVSS3