Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-12836 (GCVE-0-2017-12836)
Vulnerability from cvelistv5 – Published: 2017-08-24 14:00 – Updated: 2024-08-05 18:51- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T18:51:06.827Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "100279",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/100279"
},
{
"name": "[oss-security] 20170811 Re: CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"name": "DSA-3940",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"name": "[oss-security] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"name": "[bug-cvs] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"name": "GLSA-201709-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"name": "USN-3399-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3399-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-08-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-25T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "100279",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/100279"
},
{
"name": "[oss-security] 20170811 Re: CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"name": "DSA-3940",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"name": "[oss-security] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"name": "[bug-cvs] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"name": "GLSA-201709-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"name": "USN-3399-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3399-1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-12836",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "100279",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100279"
},
{
"name": "[oss-security] 20170811 Re: CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"name": "DSA-3940",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"name": "[oss-security] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"name": "[bug-cvs] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"name": "GLSA-201709-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"name": "USN-3399-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3399-1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-12836",
"datePublished": "2017-08-24T14:00:00.000Z",
"dateReserved": "2017-08-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T18:51:06.827Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-12836\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-24T14:29:00.397\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \\\"-oProxyCommand=id;localhost:/bar.\\\"\"},{\"lang\":\"es\",\"value\":\"CVS 1.12.x, cuando se configura para que use SSH para repositorios remotos, podr\u00eda permitir que atacantes remotos ejecuten c\u00f3digo arbitrario mediante una URL de repositorio con un nombre de host manipulado, tal y como demuestra \\\"-oProxyCommand=id;localhost:/bar.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359EEFB0-AE2F-4F7B-AF46-B72E0F6515FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"820263AF-2639-4FE3-938F-E7EAB2369824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA492E1-DF19-454F-B355-B52905D2636F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246AC1F0-F5A9-42DA-9E16-92FED6CDB5E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D913462-3B95-4092-81B8-E6B78499C6FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521809DF-2D04-4DFC-9028-97C62EB4F8CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9717A42-7B9F-40B4-B924-8190F522AC3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44DBECDC-5B09-47CB-ABDE-6FE287B36D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B70BBA7-B635-44E9-98A3-2B1B8721D286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:cvs:1.12.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FC08C4-73FB-4EF0-B3DD-4262D97B9500\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3940\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/08/11/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/08/11/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100279\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3399-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1480800\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201709-17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/08/11/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/08/11/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3399-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1480800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201709-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GSD-2017-12836
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-12836",
"description": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"id": "GSD-2017-12836",
"references": [
"https://www.suse.com/security/cve/CVE-2017-12836.html",
"https://www.debian.org/security/2017/dsa-3940",
"https://ubuntu.com/security/CVE-2017-12836",
"https://advisories.mageia.org/CVE-2017-12836.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-12836"
],
"details": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"id": "GSD-2017-12836",
"modified": "2023-12-13T01:21:03.661136Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-12836",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "100279",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100279"
},
{
"name": "[oss-security] 20170811 Re: CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"name": "DSA-3940",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"name": "[oss-security] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"name": "[bug-cvs] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"name": "GLSA-201709-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"name": "USN-3399-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3399-1"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:cvs:1.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-12836"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"name": "USN-3399-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-3399-1"
},
{
"name": "100279",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100279"
},
{
"name": "[oss-security] 20170811 Re: CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"name": "[oss-security] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"name": "DSA-3940",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"name": "[bug-cvs] 20170810 CVS and ssh command injection (see CVE-2017-1000117, etc.)",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"name": "GLSA-201709-17",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201709-17"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2017-08-24T14:29Z"
}
}
}
hsec-2023-0009
Vulnerability from osv_haskell
git-annex command injection via malicious SSH hostname
git-annex was vulnerable to the same class of security hole as
git's CVE-2017-1000117. In several cases, git-annex parses a
repository URL, and uses it to generate a ssh command, with the
hostname to ssh to coming from the URL. If the hostname it parses is
something like -eProxyCommand=evil, this could result in arbitrary
local code execution.
Some details of URL parsing may prevent the exploit working in some cases.
Exploiting this would involve the attacker tricking the victim into
adding a remote something like ssh://-eProxyCommand=evil/blah.
One possible avenue for an attacker that avoids exposing the URL to
the user is to use initremote with an SSH remote, so embedding the
URL in the git-annex branch. Then the victim would enable it with
enableremote.
This was fixed in version 6.20170818. Now there's a SshHost
type that is not allowed to start with a dash, and every invocation
of git-annex uses a function that takes a SshHost.
{
"affected": [
{
"database_specific": {
"human_link": "https://github.com/haskell/security-advisories/tree/main/advisories/published/2023/HSEC-2023-0009.md",
"osv": "https://raw.githubusercontent.com/haskell/security-advisories/refs/heads/generated/osv-export/2023/HSEC-2023-0009.json"
},
"package": {
"ecosystem": "Hackage",
"name": "git-annex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.20170818"
}
],
"type": "ECOSYSTEM"
}
],
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2017-12976"
],
"database_specific": {
"home": "https://github.com/haskell/security-advisories",
"osvs": "https://raw.githubusercontent.com/haskell/security-advisories/refs/heads/generated/osv-export",
"repository": "https://github.com/haskell/security-advisories"
},
"details": "# *git-annex* command injection via malicious SSH hostname\n\n*git-annex* was vulnerable to the same class of security hole as\ngit\u0027s **CVE-2017-1000117**. In several cases, `git-annex` parses a\nrepository URL, and uses it to generate a `ssh` command, with the\nhostname to ssh to coming from the URL. If the hostname it parses is\nsomething like `-eProxyCommand=evil`, this could result in arbitrary\nlocal code execution.\n\nSome details of URL parsing may prevent the exploit working in some\ncases.\n\nExploiting this would involve the attacker tricking the victim into\nadding a remote something like `ssh://-eProxyCommand=evil/blah`.\n\nOne possible avenue for an attacker that avoids exposing the URL to\nthe user is to use `initremote` with an SSH remote, so embedding the\nURL in the *git-annex* branch. Then the victim would enable it with\n`enableremote`.\n\nThis was fixed in version **6.20170818**. Now there\u0027s a `SshHost`\ntype that is not allowed to start with a dash, and every invocation\nof `git-annex` uses a function that takes a `SshHost`.\n",
"id": "HSEC-2023-0009",
"modified": "2025-11-14T14:45:34Z",
"published": "2025-11-14T14:45:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://git-annex.branchable.com/security/CVE-2017-12976/"
},
{
"type": "FIX",
"url": "http://source.git-annex.branchable.com/?p=source.git;a=commitdiff;h=df11e54788b254efebb4898b474de11ae8d3b471"
}
],
"related": [
"CVE-2017-9800",
"CVE-2017-12836",
"CVE-2017-1000116",
"CVE-2017-1000117"
],
"schema_version": "1.5.0",
"summary": "git-annex command injection via malicious SSH hostname"
}
FKIE_CVE-2017-12836
Vulnerability from fkie_nvd - Published: 2017-08-24 14:29 - Updated: 2025-04-20 01:37| Vendor | Product | Version | |
|---|---|---|---|
| gnu | cvs | 1.12.1 | |
| gnu | cvs | 1.12.3 | |
| gnu | cvs | 1.12.5 | |
| gnu | cvs | 1.12.6 | |
| gnu | cvs | 1.12.7 | |
| gnu | cvs | 1.12.9 | |
| gnu | cvs | 1.12.10 | |
| gnu | cvs | 1.12.11 | |
| gnu | cvs | 1.12.12 | |
| gnu | cvs | 1.12.13 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 17.04 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "359EEFB0-AE2F-4F7B-AF46-B72E0F6515FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "820263AF-2639-4FE3-938F-E7EAB2369824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA492E1-DF19-454F-B355-B52905D2636F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "246AC1F0-F5A9-42DA-9E16-92FED6CDB5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1D913462-3B95-4092-81B8-E6B78499C6FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "521809DF-2D04-4DFC-9028-97C62EB4F8CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F9717A42-7B9F-40B4-B924-8190F522AC3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "44DBECDC-5B09-47CB-ABDE-6FE287B36D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3B70BBA7-B635-44E9-98A3-2B1B8721D286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:cvs:1.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC08C4-73FB-4EF0-B3DD-4262D97B9500",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\""
},
{
"lang": "es",
"value": "CVS 1.12.x, cuando se configura para que use SSH para repositorios remotos, podr\u00eda permitir que atacantes remotos ejecuten c\u00f3digo arbitrario mediante una URL de repositorio con un nombre de host manipulado, tal y como demuestra \"-oProxyCommand=id;localhost:/bar."
}
],
"id": "CVE-2017-12836",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-24T14:29:00.397",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100279"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-3399-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-3399-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201709-17"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10708-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |
|---|---|---|
|
|
||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cvs-1.12.13-1.14 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cvs-1.12.13-1.14 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10708",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10708-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12836 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12836/"
}
],
"title": "cvs-1.12.13-1.14 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10708-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.13-1.14.aarch64",
"product": {
"name": "cvs-1.12.13-1.14.aarch64",
"product_id": "cvs-1.12.13-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.13-1.14.aarch64",
"product": {
"name": "cvs-doc-1.12.13-1.14.aarch64",
"product_id": "cvs-doc-1.12.13-1.14.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.13-1.14.ppc64le",
"product": {
"name": "cvs-1.12.13-1.14.ppc64le",
"product_id": "cvs-1.12.13-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.13-1.14.ppc64le",
"product": {
"name": "cvs-doc-1.12.13-1.14.ppc64le",
"product_id": "cvs-doc-1.12.13-1.14.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.13-1.14.s390x",
"product": {
"name": "cvs-1.12.13-1.14.s390x",
"product_id": "cvs-1.12.13-1.14.s390x"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.13-1.14.s390x",
"product": {
"name": "cvs-doc-1.12.13-1.14.s390x",
"product_id": "cvs-doc-1.12.13-1.14.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.13-1.14.x86_64",
"product": {
"name": "cvs-1.12.13-1.14.x86_64",
"product_id": "cvs-1.12.13-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.13-1.14.x86_64",
"product": {
"name": "cvs-doc-1.12.13-1.14.x86_64",
"product_id": "cvs-doc-1.12.13-1.14.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.13-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-1.12.13-1.14.aarch64"
},
"product_reference": "cvs-1.12.13-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.13-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-1.12.13-1.14.ppc64le"
},
"product_reference": "cvs-1.12.13-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.13-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-1.12.13-1.14.s390x"
},
"product_reference": "cvs-1.12.13-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.13-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-1.12.13-1.14.x86_64"
},
"product_reference": "cvs-1.12.13-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.13-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.aarch64"
},
"product_reference": "cvs-doc-1.12.13-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.13-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.ppc64le"
},
"product_reference": "cvs-doc-1.12.13-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.13-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.s390x"
},
"product_reference": "cvs-doc-1.12.13-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.13-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.x86_64"
},
"product_reference": "cvs-doc-1.12.13-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-12836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12836"
}
],
"notes": [
{
"category": "general",
"text": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cvs-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.x86_64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12836",
"url": "https://www.suse.com/security/cve/CVE-2017-12836"
},
{
"category": "external",
"summary": "SUSE Bug 1052481 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052481"
},
{
"category": "external",
"summary": "SUSE Bug 1052696 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052696"
},
{
"category": "external",
"summary": "SUSE Bug 1052932 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052932"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1054653 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1054653"
},
{
"category": "external",
"summary": "SUSE Bug 1059797 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1059797"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cvs-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.x86_64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cvs-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-1.12.13-1.14.x86_64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.aarch64",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.ppc64le",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.s390x",
"openSUSE Tumbleweed:cvs-doc-1.12.13-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-12836"
}
]
}
GHSA-GW7C-P8CP-7935
Vulnerability from github – Published: 2022-05-13 01:42 – Updated: 2022-05-13 01:42CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
{
"affected": [],
"aliases": [
"CVE-2017-12836"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-08-24T14:29:00Z",
"severity": "HIGH"
},
"details": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"id": "GHSA-gw7c-p8cp-7935",
"modified": "2022-05-13T01:42:47Z",
"published": "2022-05-13T01:42:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12836"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480800"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201709-17"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2017/dsa-3940"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2017/08/11/4"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/100279"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-3399-1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2017:2419-1
Vulnerability from csaf_suse - Published: 2017-09-12 15:33 - Updated: 2017-09-12 15:33{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cvs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cvs fixes the following issues:\n\n - CVE-2017-12836: A leading dash in the argument of the \u0027-d\u0027 option could lead to argument injection (bsc#1053364)\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2017-1499,SUSE-SLE-DESKTOP-12-SP3-2017-1499,SUSE-SLE-RPI-12-SP2-2017-1499,SUSE-SLE-SERVER-12-SP2-2017-1499,SUSE-SLE-SERVER-12-SP3-2017-1499",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2419-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2419-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172419-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2419-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html"
},
{
"category": "self",
"summary": "SUSE Bug 1053364",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12836 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12836/"
}
],
"title": "Security update for cvs",
"tracking": {
"current_release_date": "2017-09-12T15:33:56Z",
"generator": {
"date": "2017-09-12T15:33:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2419-1",
"initial_release_date": "2017-09-12T15:33:56Z",
"revision_history": [
{
"date": "2017-09-12T15:33:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-182.3.1.aarch64",
"product": {
"name": "cvs-1.12.12-182.3.1.aarch64",
"product_id": "cvs-1.12.12-182.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-doc-1.12.12-182.3.1.noarch",
"product": {
"name": "cvs-doc-1.12.12-182.3.1.noarch",
"product_id": "cvs-doc-1.12.12-182.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-182.3.1.ppc64le",
"product": {
"name": "cvs-1.12.12-182.3.1.ppc64le",
"product_id": "cvs-1.12.12-182.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-182.3.1.s390x",
"product": {
"name": "cvs-1.12.12-182.3.1.s390x",
"product_id": "cvs-1.12.12-182.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-182.3.1.x86_64",
"product": {
"name": "cvs-1.12.12-182.3.1.x86_64",
"product_id": "cvs-1.12.12-182.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-1.12.12-182.3.1.aarch64"
},
"product_reference": "cvs-1.12.12-182.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-182.3.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-doc-1.12.12-182.3.1.noarch"
},
"product_reference": "cvs-doc-1.12.12-182.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.aarch64"
},
"product_reference": "cvs-1.12.12-182.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.ppc64le"
},
"product_reference": "cvs-1.12.12-182.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.s390x"
},
"product_reference": "cvs-1.12.12-182.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-182.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:cvs-doc-1.12.12-182.3.1.noarch"
},
"product_reference": "cvs-doc-1.12.12-182.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.aarch64"
},
"product_reference": "cvs-1.12.12-182.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.ppc64le"
},
"product_reference": "cvs-1.12.12-182.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.s390x"
},
"product_reference": "cvs-1.12.12-182.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-182.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-doc-1.12.12-182.3.1.noarch"
},
"product_reference": "cvs-doc-1.12.12-182.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.aarch64"
},
"product_reference": "cvs-1.12.12-182.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.ppc64le"
},
"product_reference": "cvs-1.12.12-182.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.s390x"
},
"product_reference": "cvs-1.12.12-182.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-182.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:cvs-doc-1.12.12-182.3.1.noarch"
},
"product_reference": "cvs-doc-1.12.12-182.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.aarch64"
},
"product_reference": "cvs-1.12.12-182.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.ppc64le"
},
"product_reference": "cvs-1.12.12-182.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.s390x"
},
"product_reference": "cvs-1.12.12-182.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-182.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-182.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-182.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-doc-1.12.12-182.3.1.noarch"
},
"product_reference": "cvs-doc-1.12.12-182.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-12836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12836"
}
],
"notes": [
{
"category": "general",
"text": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-doc-1.12.12-182.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12836",
"url": "https://www.suse.com/security/cve/CVE-2017-12836"
},
{
"category": "external",
"summary": "SUSE Bug 1052481 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052481"
},
{
"category": "external",
"summary": "SUSE Bug 1052696 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052696"
},
{
"category": "external",
"summary": "SUSE Bug 1052932 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052932"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1054653 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1054653"
},
{
"category": "external",
"summary": "SUSE Bug 1059797 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1059797"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-doc-1.12.12-182.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:cvs-doc-1.12.12-182.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-1.12.12-182.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:cvs-doc-1.12.12-182.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-09-12T15:33:56Z",
"details": "important"
}
],
"title": "CVE-2017-12836"
}
]
}
SUSE-SU-2017:2422-1
Vulnerability from csaf_suse - Published: 2017-09-12 15:33 - Updated: 2017-09-12 15:33| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cvs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cvs fixes the following issues:\n\n - CVE-2017-12836: A leading dash in the argument of the \u0027-d\u0027 option could lead to argument injection (bsc#1053364)\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-cvs-13279,slessp4-cvs-13279",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2422-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html"
},
{
"category": "self",
"summary": "SUSE Bug 1053364",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12836 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12836/"
}
],
"title": "Security update for cvs",
"tracking": {
"current_release_date": "2017-09-12T15:33:24Z",
"generator": {
"date": "2017-09-12T15:33:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2422-1",
"initial_release_date": "2017-09-12T15:33:24Z",
"revision_history": [
{
"date": "2017-09-12T15:33:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cvs-doc-1.12.12-144.23.5.3.1.i586",
"product": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.i586",
"product_id": "cvs-doc-1.12.12-144.23.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "cvs-1.12.12-144.23.5.3.1.i586",
"product": {
"name": "cvs-1.12.12-144.23.5.3.1.i586",
"product_id": "cvs-1.12.12-144.23.5.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-144.23.5.3.1.ia64",
"product": {
"name": "cvs-1.12.12-144.23.5.3.1.ia64",
"product_id": "cvs-1.12.12-144.23.5.3.1.ia64"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.12-144.23.5.3.1.ia64",
"product": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ia64",
"product_id": "cvs-doc-1.12.12-144.23.5.3.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-144.23.5.3.1.ppc64",
"product": {
"name": "cvs-1.12.12-144.23.5.3.1.ppc64",
"product_id": "cvs-1.12.12-144.23.5.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"product": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"product_id": "cvs-doc-1.12.12-144.23.5.3.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-1.12.12-144.23.5.3.1.s390x",
"product": {
"name": "cvs-1.12.12-144.23.5.3.1.s390x",
"product_id": "cvs-1.12.12-144.23.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "cvs-doc-1.12.12-144.23.5.3.1.s390x",
"product": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.s390x",
"product_id": "cvs-doc-1.12.12-144.23.5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"product": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"product_id": "cvs-doc-1.12.12-144.23.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cvs-1.12.12-144.23.5.3.1.x86_64",
"product": {
"name": "cvs-1.12.12-144.23.5.3.1.x86_64",
"product_id": "cvs-1.12.12-144.23.5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.i586"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.i586"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-1.12.12-144.23.5.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64"
},
"product_reference": "cvs-1.12.12-144.23.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cvs-doc-1.12.12-144.23.5.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
},
"product_reference": "cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-12836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12836"
}
],
"notes": [
{
"category": "general",
"text": "CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by \"-oProxyCommand=id;localhost:/bar.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12836",
"url": "https://www.suse.com/security/cve/CVE-2017-12836"
},
{
"category": "external",
"summary": "SUSE Bug 1052481 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052481"
},
{
"category": "external",
"summary": "SUSE Bug 1052696 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052696"
},
{
"category": "external",
"summary": "SUSE Bug 1052932 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1052932"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1054653 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1054653"
},
{
"category": "external",
"summary": "SUSE Bug 1059797 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1059797"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-12836",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:cvs-doc-1.12.12-144.23.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-09-12T15:33:24Z",
"details": "important"
}
],
"title": "CVE-2017-12836"
}
]
}
CNVD-2017-28447
Vulnerability from cnvd - Published: 2017-09-27目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: https://www.redhat.com
| Name | Red Hat CVS 1.12.* |
|---|
{
"bids": {
"bid": {
"bidNumber": "100279"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-12836"
}
},
"description": "CVS\u662f\u4e00\u6b3e\u514d\u8d39\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u7248\u672c\u63a7\u5236\u7cfb\u7edf\uff0c\u53ef\u4f7f\u7528\u5728\u591a\u79cdLinux\u548cUnix\u64cd\u4f5c\u7cfb\u7edf\u4e0b\uff0c\u4e5f\u53ef\u4ee5\u8fd0\u884c\u4e8eMicrosoft Windows\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCVS 1.12.x\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5e26\u6709\u7279\u5236\u4e3b\u673a\u540d\u79f0\u7684repository URL\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Red Hat",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://www.redhat.com",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-28447",
"openTime": "2017-09-27",
"patchDescription": "CVS\u662f\u4e00\u6b3e\u514d\u8d39\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u7248\u672c\u63a7\u5236\u7cfb\u7edf\uff0c\u53ef\u4f7f\u7528\u5728\u591a\u79cdLinux\u548cUnix\u64cd\u4f5c\u7cfb\u7edf\u4e0b\uff0c\u4e5f\u53ef\u4ee5\u8fd0\u884c\u4e8eMicrosoft Windows\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCVS 1.12.x\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5e26\u6709\u7279\u5236\u4e3b\u673a\u540d\u79f0\u7684repository URL\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Red Hat CVS\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Red Hat CVS 1.12.*"
},
"referenceLink": "http://www.securityfocus.com/bid/100279\r\nhttp://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html\r\nhttps://www.debian.org/security/2017/dsa-3940",
"serverity": "\u4e2d",
"submitTime": "2017-08-15",
"title": "Red Hat CVS\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}
BDU:2018-00109
Vulnerability from fstec - Published: 10.08.2017{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 17.04 (Ubuntu), 14.04 (Ubuntu), 1.12.1 (CVS), 1.12.3 (CVS), 1.12.5 (CVS), 1.12.6 (CVS), 1.12.7 (CVS), 1.12.9 (CVS), 1.12.10 (CVS), 1.12.11 (CVS), 1.12.12 (CVS), 1.12.13 (CVS), 16.04 (Ubuntu)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f CVS \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttp://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html\n\n\u0414\u043b\u044f Ubuntu \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: http://www.ubuntu.com/usn/USN-3399-0\n\n\u0414\u043b\u044f Debian\u00a0GNU/Linux \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttp://www.debian.org/security/2017/dsa-3940\n\n\u0414\u043b\u044f Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 2:1.12.13+real-9+deb7u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.08.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.01.2018",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2018-00109",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-12836",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Ubuntu, CVS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 CVS, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u043c \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 SSH, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0447\u0438\u0441\u0442\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u043c \u0443\u0440\u043e\u0432\u043d\u0435 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443) (CWE-77)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 CVS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u043c \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 SSH. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0438\u043c\u0435\u043d\u0438 \u0445\u043e\u0441\u0442\u0430 \u0432 URL-\u0430\u0434\u0440\u0435\u0441\u0435 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html\nhttp://www.debian.org/security/2017/dsa-3940\nhttp://www.openwall.com/lists/oss-security/2017/08/11/1\nhttp://www.openwall.com/lists/oss-security/2017/08/11/4\nhttp://www.securityfocus.com/bid/100279\nhttp://www.ubuntu.com/usn/USN-3399-1\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1480800",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-77",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,1)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.