8.3 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.018 Low
EPSS
Percentile
87.7%
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the “–date=TZ=“123"345” @1” string to the touch or date command.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 10.04 | |
coreutils | lt | 8.23 |
advisories.mageia.org/MGASA-2015-0029.html
debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
secunia.com/advisories/62226
ubuntu.com/usn/usn-2473-1
www.mandriva.com/security/advisories?name=MDVSA-2015:179
www.openwall.com/lists/oss-security/2014/11/25/1
www.openwall.com/lists/oss-security/2014/11/25/4
www.openwall.com/lists/oss-security/2015/01/03/11
bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
security.gentoo.org/glsa/201612-22