Описание
less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 590-2ubuntu2.1 |
esm-infra-legacy/trusty | not-affected | 458-2ubuntu0.1~esm1 |
esm-infra/bionic | released | 487-0.1ubuntu0.1~esm2 |
esm-infra/focal | not-affected | 551-1ubuntu0.3 |
esm-infra/xenial | released | 481-2.1ubuntu0.2+esm2 |
focal | released | 551-1ubuntu0.3 |
jammy | released | 590-1ubuntu0.22.04.3 |
mantic | released | 590-2ubuntu0.23.10.2 |
noble | released | 590-2ubuntu2.1 |
trusty/esm | released | 458-2ubuntu0.1~esm1 |
Показывать по
EPSS
8.6 High
CVSS3
Связанные уязвимости
less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
less through 653 allows OS command execution via a newline character i ...
EPSS
8.6 High
CVSS3