6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.5 Medium
AI Score
Confidence
Low
0.017 Low
EPSS
Percentile
87.8%
Debian Security Advisory DSA-2997-1 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
August 05, 2014 http://www.debian.org/security/faq
Package : reportbug
CVE ID : CVE-2014-0479
Jakub Wilk discovered a remote command execution flaw in reportbug, a
tool to report bugs in the Debian distribution. A man-in-the-middle
attacker could put shell metacharacters in the version number allowing
arbitrary code execution with the privileges of the user running
reportbug.
For the stable distribution (wheezy), this problem has been fixed in
version 6.4.4+deb7u1.
For the testing distribution (jessie), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in
version 6.5.0+nmu1.
We recommend that you upgrade your reportbug packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | python-reportbug | < 6.4.4+deb7u1 | python-reportbug_6.4.4+deb7u1_all.deb |
Debian | 6 | all | python-reportbug | < 4.12.6+deb6u1 | python-reportbug_4.12.6+deb6u1_all.deb |
Debian | 6 | all | reportbug | < 4.12.6+deb6u1 | reportbug_4.12.6+deb6u1_all.deb |
Debian | 7 | all | reportbug | < 6.4.4+deb7u1 | reportbug_6.4.4+deb7u1_all.deb |