Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-16718

Опубликовано: 23 сент. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

4.2.1+dfsg-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

focal

not-affected

4.2.1+dfsg-1
groovy

not-affected

4.2.1+dfsg-1

Показывать по

EPSS

Процентиль: 80%
0.0134
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.

CVSS3: 7.8
debian
больше 6 лет назад

In radare2 before 3.9.0, a command injection vulnerability exists in b ...

github
больше 3 лет назад

In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.

EPSS

Процентиль: 80%
0.0134
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3