6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.016 Low
EPSS
Percentile
87.5%
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD’s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
rachelbythebay.com/w/2018/04/05/bangpatch/
access.redhat.com/errata/RHSA-2018:1199
access.redhat.com/errata/RHSA-2018:1200
access.redhat.com/errata/RHSA-2018:2091
access.redhat.com/errata/RHSA-2018:2092
access.redhat.com/errata/RHSA-2018:2093
access.redhat.com/errata/RHSA-2018:2094
access.redhat.com/errata/RHSA-2018:2095
access.redhat.com/errata/RHSA-2018:2096
access.redhat.com/errata/RHSA-2018:2097
bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
lists.debian.org/debian-lts-announce/2018/04/msg00013.html
savannah.gnu.org/bugs/index.php?53566
seclists.org/bugtraq/2019/Aug/29
seclists.org/bugtraq/2019/Jul/54
security.gentoo.org/glsa/201904-17
twitter.com/kurtseifried/status/982028968877436928
usn.ubuntu.com/3624-1/
usn.ubuntu.com/3624-2/
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.016 Low
EPSS
Percentile
87.5%