9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.2%
Severity: High
Date : 2019-10-23
CVE-ID : CVE-2019-18182 CVE-2019-18183
Package : pacman
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1049
The package pacman before version 5.2.0-1 is vulnerable to arbitrary
command execution.
Upgrade to 5.2.0-1.
The problems have been fixed upstream in version 5.2.0.
For CVE-2019-18182:
Ensure XferCommand
is commented out in /etc/pacman.conf
For CVE-2019-18183:
Ensure UseDelta
is commented out in /etc/pacman.conf
pacman before 5.2 is vulnerable to arbitrary command injection in
src/pacman/conf.c in the download_with_xfercommand() function. This can
be exploited when unsigned databases are used. To exploit the
vulnerability, the user must enable a non-default XferCommand and
retrieve an attacker-controlled crafted database and package.
pacman before 5.2 is vulnerable to arbitrary command injection in
lib/libalpm/sync.c in the apply_deltas() function. This can be
exploited when unsigned databases are used. To exploit the
vulnerability, the user must enable the non-default delta feature and
retrieve an attacker-controlled crafted database and delta file.
A remote attacker is able to execute arbitrary commands on the host
with a specially crafted database and a package or delta file.
https://git.archlinux.org/pacman.git/tree/src/pacman/conf.c?h=v5.1.3#n263
https://git.archlinux.org/pacman.git/commit/?id=808a4f15ce82d2ed7eeb06de73d0f313620558ee
https://git.archlinux.org/pacman.git/tree/lib/libalpm/sync.c?h=v5.1.3#n767
https://git.archlinux.org/pacman.git/commit/?id=c0e9be7973be6c81b22fde91516fb8991e7bb07b
https://security.archlinux.org/CVE-2019-18182
https://security.archlinux.org/CVE-2019-18183
git.archlinux.org/pacman.git/commit/?id=808a4f15ce82d2ed7eeb06de73d0f313620558ee
git.archlinux.org/pacman.git/commit/?id=c0e9be7973be6c81b22fde91516fb8991e7bb07b
git.archlinux.org/pacman.git/tree/lib/libalpm/sync.c?h=v5.1.3#n767
git.archlinux.org/pacman.git/tree/src/pacman/conf.c?h=v5.1.3#n263
security.archlinux.org/AVG-1049
security.archlinux.org/CVE-2019-18182
security.archlinux.org/CVE-2019-18183
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.2%