CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
86.7%
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the “–date=TZ=“123"345” @1” string to the touch or date command.
Vendor | Product | Version | CPE |
---|---|---|---|
gnu | coreutils | * | cpe:2.3:a:gnu:coreutils:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 10.04 | cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* |
advisories.mageia.org/MGASA-2015-0029.html
debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
secunia.com/advisories/62226
ubuntu.com/usn/usn-2473-1
www.mandriva.com/security/advisories?name=MDVSA-2015:179
www.openwall.com/lists/oss-security/2014/11/25/1
www.openwall.com/lists/oss-security/2014/11/25/4
www.openwall.com/lists/oss-security/2015/01/03/11
bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
security.gentoo.org/glsa/201612-22