Lucene search

K
gentooGentoo FoundationGLSA-201603-02
HistoryMar 06, 2016 - 12:00 a.m.

OSC: Shell command injection

2016-03-0600:00:00
Gentoo Foundation
security.gentoo.org
15

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.6%

Background

OSC is the command line tool and API for the Open Build Service.

Description

A vulnerability has been discovered that may allow remote attackers to execute arbitrary commands via shell metacharacters in a _service file.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known work around at this time.

Resolution

All OSC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/osc-0.152.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/osc< 0.152.0UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.6%