Lucene search

K
freebsdFreeBSD76E2FCCE-92D2-11ED-A635-080027F5FEC9
HistoryNov 28, 2022 - 12:00 a.m.

emacs -- arbitary shell command execution vulnerability of ctags

2022-11-2800:00:00
vuxml.freebsd.org
16
gnu emacs
shell metacharacters
source-code file
lib-src/etags.c
c library function
current working directory
untrusted input
vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%

lu4nx reports:

    GNU Emacs through 28.2 allows attackers to execute
    commands via shell metacharacters in the name of a
    source-code file, because lib-src/etags.c uses the system
    C library function in its implementation of the ctags
    program. For example, a victim may use the "ctags *"
    command (suggested in the ctags documentation) in a
    situation where the current working directory has contents
    that depend on untrusted input.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchemacs< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-canna< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-nox< 28.2_2,3UNKNOWN
FreeBSDanynoarchemacs-devel< 30.0.50.202211128,2UNKNOWN
FreeBSDanynoarchemacs-devel-nox< 30.0.50.202211128,2UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%