CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:C/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
91.7%
Software: path 2.7.1
OS: Cobalt 7.9
CVE-ID: CVE-2014-9637
CVE-Crit: MEDIUM
CVE-DESC: GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation error) with a crafted diff file.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2015-1196
CVE-Crit: CRITICAL
CVE-DESC: GNU patch 2.7.1 allows remote attackers to write to arbitrary files using a symbolic link attack in the patch file.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2015-1395
CVE-Crit: HIGH
CVE-DESC: A directory traversal vulnerability in GNU patch versions that support Git-style patching prior to 2.7.3 allows remote attackers to write to arbitrary files with the target user’s permissions via … (dot-dot-dot) in the diff filename.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2015-1396
CVE-Crit: HIGH
CVE-DESC: There is a directory traversal vulnerability in the GNU patch to 2.7.4. A remote attacker can write to arbitrary files using a symbolic link attack in the patch file. NOTE: this issue occurs due to an incomplete patch for CVE-2015-1196.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2018-6951
CVE-Crit: HIGH
CVE-DESC: The issue was discovered in the GNU patch to 2.7.6. There is a segmentation error related to dereferencing a NULL pointer, causing a denial of service in the intuit_diff_type function in pch.c, also known as the “garbled rename” problem.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2019-13636
CVE-Crit: MEDIUM
CVE-DESC: In the GNU patch to 2.7.6, the following symbolic links are incorrectly handled in some cases other than input files. This affects inp.c and util.c.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2019-20633
CVE-Crit: MEDIUM
CVE-DESC: The GNU patch to 2.7.6 contains a Double Free (p_line [p_end]) vulnerability in the another_hunk function in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue occurs due to an incomplete patch for CVE-2018-6952.
CVE-STATUS: default
CVE-REV: default
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:C/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
91.7%