Lucene search

K
freebsdFreeBSD8B20D716-49DF-11EA-9F7B-206A8A720317
HistoryOct 01, 2019 - 12:00 a.m.

ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection

2019-10-0100:00:00
vuxml.freebsd.org
10

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

56.6%

Upstream ksh93 maintainer Siteshwar Vashisht reports:

A flaw was found in the way ksh evaluates certain environment
variables. An attacker could use this flaw to override or bypass
environment restrictions to execute shell commands. Services and
applications that allow remote unauthenticated attackers to
provide one of those environment variables could allow them to
exploit this issue remotely.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchksh93= 2020.0.0UNKNOWN
FreeBSDanynoarchksh93< 2020.0.1_1,1UNKNOWN
FreeBSDanynoarchksh93-devel< 2020.02.07UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

56.6%