Lucene search

K
freebsdFreeBSD76E2FCCE-92D2-11ED-A635-080027F5FEC9
HistoryNov 28, 2022 - 12:00 a.m.

emacs -- arbitary shell command execution vulnerability of ctags

2022-11-2800:00:00
vuxml.freebsd.org
14

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

33.7%

lu4nx reports:

    GNU Emacs through 28.2 allows attackers to execute
    commands via shell metacharacters in the name of a
    source-code file, because lib-src/etags.c uses the system
    C library function in its implementation of the ctags
    program. For example, a victim may use the "ctags *"
    command (suggested in the ctags documentation) in a
    situation where the current working directory has contents
    that depend on untrusted input.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchemacs< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-canna< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-nox< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-devel< 30.0.50.202211128,2UNKNOWN
FreeBSDanynoarchemacs-devel-nox< 30.0.50.202211128,2UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

33.7%