Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-48337
HistoryFeb 20, 2023 - 11:15 p.m.

CVE-2022-48337

2023-02-2023:15:12
Debian Security Bug Tracker
security-tracker.debian.org
23
gnu emacs
etags.c
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.9%

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the โ€œetags -u *โ€ command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

OSVersionArchitecturePackageVersionFilename
Debian12allemacs<ย 1:28.2+1-11emacs_1:28.2+1-11_all.deb
Debian11allemacs<ย 1:27.1+1-3.1+deb11u2emacs_1:27.1+1-3.1+deb11u2_all.deb
Debian999allemacs<ย 1:28.2+1-11emacs_1:28.2+1-11_all.deb
Debian13allemacs<ย 1:28.2+1-11emacs_1:28.2+1-11_all.deb

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.9%