Lucene search

K
gentooGentoo FoundationGLSA-201603-02
HistoryMar 06, 2016 - 12:00 a.m.

OSC: Shell command injection

2016-03-0600:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.4%

Background

OSC is the command line tool and API for the Open Build Service.

Description

A vulnerability has been discovered that may allow remote attackers to execute arbitrary commands via shell metacharacters in a _service file.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known work around at this time.

Resolution

All OSC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/osc-0.152.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/osc< 0.152.0UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.4%