7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.6 High
AI Score
Confidence
High
0.016 Low
EPSS
Percentile
87.6%
Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allows remote attackers to execute arbitrary commands via shell metacharacters in filename arguments.
git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=c8d01f062b3e5137cf65196760b079a855c75e00
git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=fbe0c92b2ef7e360d13414bf40d6af5507d0c86d
packages.debian.org/changelogs/pool/main/l/lintian/lintian_2.3.2/changelog
packages.qa.debian.org/l/lintian/news/20100128T015554Z.html
secunia.com/advisories/38375
secunia.com/advisories/38379
www.debian.org/security/2010/dsa-1979
www.securityfocus.com/bid/37975
www.ubuntu.com/usn/USN-891-1