Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-45939
HistoryNov 28, 2022 - 12:00 a.m.

CVE-2022-45939

2022-11-2800:00:00
ubuntu.com
ubuntu.com
12
cve-2022-45939
emacs
shell command execution
metacharacters
source-code
file names
libc
etags
ctags
debbugs
debian
unix

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%

GNU Emacs through 28.2 allows attackers to execute commands via shell
metacharacters in the name of a source-code file, because lib-src/etags.c
uses the system C library function in its implementation of the ctags
program. For example, a victim may use the “ctags *” command (suggested in
the ctags documentation) in a situation where the current working directory
has contents that depend on untrusted input.

Bugs

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%