Описание
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
Меры по смягчению последствий
No known mitigation available.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | ksh | Out of support scope | ||
| Red Hat Enterprise Linux 6 | ksh | Fixed | RHSA-2020:0515 | 17.02.2020 |
| Red Hat Enterprise Linux 7 | ksh | Fixed | RHSA-2020:0568 | 24.02.2020 |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | ksh | Fixed | RHSA-2020:5352 | 07.12.2020 |
| Red Hat Enterprise Linux 7.3 Advanced Update Support | ksh | Fixed | RHSA-2020:5351 | 07.12.2020 |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | ksh | Fixed | RHSA-2020:2210 | 19.05.2020 |
| Red Hat Enterprise Linux 7.4 Telco Extended Update Support | ksh | Fixed | RHSA-2020:2210 | 19.05.2020 |
| Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions | ksh | Fixed | RHSA-2020:2210 | 19.05.2020 |
| Red Hat Enterprise Linux 7.5 Extended Update Support | ksh | Fixed | RHSA-2020:1332 | 06.04.2020 |
| Red Hat Enterprise Linux 7.6 Extended Update Support | ksh | Fixed | RHSA-2020:1333 | 06.04.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS3
Связанные уязвимости
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
In ksh version 20120801, a flaw was found in the way it evaluates cert ...
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
EPSS
7.4 High
CVSS3