Lucene search

K
freebsdFreeBSD26B1100A-5A27-11ED-ABFE-29AC76EC31B5
HistoryOct 17, 2022 - 12:00 a.m.

go -- syscall, os/exec: unsanitized NUL in environment variables

2022-10-1700:00:00
vuxml.freebsd.org
22
go
project
syscall
os/exec
environment variables
windows
startprocess
cmd
malicious
exploit

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

41.9%

The Go project reports:

syscall, os/exec: unsanitized NUL in environment
variables
On Windows, syscall.StartProcess and os/exec.Cmd did not
properly check for invalid environment variable values. A
malicious environment variable value could exploit this
behavior to set a value for a different environment
variable. For example, the environment variable string
โ€œA=B\x00C=Dโ€ set the variables โ€œA=Bโ€ and โ€œC=Dโ€.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgo118<ย 1.18.8UNKNOWN
FreeBSDanynoarchgo119<ย 1.19.3UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

41.9%