Lucene search

K
ubuntuUbuntuUSN-4700-1
HistoryJan 19, 2021 - 12:00 a.m.

PyXDG vulnerability

2021-01-1900:00:00
ubuntu.com
96
ubuntu 18.04 esm
ubuntu 16.04 esm
ubuntu 14.04 esm
pyxdg
input sanitization
arbitrary code executation

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.007

Percentile

80.1%

Releases

  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

Details

Alexandre D’Hondt discovered that PyXDG did not properly sanitize input.
An attacker could exploit this with a crafted .menu file to execute
arbitrary code.

OSVersionArchitecturePackageVersionFilename
Ubuntu18.04noarchpython-xdg< 0.25-4ubuntu1.1UNKNOWN
Ubuntu18.04noarchpython3-xdg< 0.25-4ubuntu1.1UNKNOWN
Ubuntu16.04noarchpython-xdg< 0.25-4ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchpython3-xdg< 0.25-4ubuntu0.16.04.1UNKNOWN
Ubuntu14.04noarchpython-xdg< 0.25-4ubuntu0.14.04.1~esm1UNKNOWN
Ubuntu14.04noarchpython-xdg< 0.25-4UNKNOWN
Ubuntu14.04noarchpython3-xdg< 0.25-4UNKNOWN
Ubuntu14.04noarchpython3-xdg< 0.25-4ubuntu0.14.04.1~esm1UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.007

Percentile

80.1%