Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47611

Опубликовано: 02 окт. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected.

Отчет

This vulnerability does not affect any Red Hat products. This vulnerability relies on abusing the best-fit mapping functionality that Windows uses to convert Unicode characters to similar looking characters in legacy code pages.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10xzNot affected
Red Hat Enterprise Linux 7xzNot affected
Red Hat Enterprise Linux 8xzNot affected
Red Hat Enterprise Linux 9xzNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-176
Дефект:
CWE-88
https://bugzilla.redhat.com/show_bug.cgi?id=2316125xz: XZ Utils on Microsoft Windows platform are vulnerable to argument injection

EPSS

Процентиль: 51%
0.00285
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

ubuntu
больше 1 года назад

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected.

nvd
больше 1 года назад

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected.

debian
больше 1 года назад

XZ Utils provide a general-purpose data-compression library plus comma ...

EPSS

Процентиль: 51%
0.00285
Низкий

5.3 Medium

CVSS3