Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-48337
HistoryFeb 20, 2023 - 12:00 a.m.

CVE-2022-48337

2023-02-2000:00:00
ubuntu.com
ubuntu.com
16
gnu emacs
shell command
security vulnerability
etags program

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.9%

GNU Emacs through 28.2 allows attackers to execute commands via shell
metacharacters in the name of a source-code file, because lib-src/etags.c
uses the system C library function in its implementation of the etags
program. For example, a victim may use the โ€œetags -u *โ€ command (suggested
in the etags documentation) in a situation where the current working
directory has contents that depend on untrusted input.

Bugs

Notes

Author Note
rodrigo-zaiden issue introduced in version 25.0.90, wit commit 1f83c3e5. the fix for this issue, in commit 01a4035c, can introduce a memory leak, the commit 0fde314f6 fixes it.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.9%