CVE-2011-3211
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
16/09/2011
Last modified:
11/04/2025
Description
The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bcfg2:bcfg2:*:*:*:*:*:*:*:* | 1.1.2 (including) | |
| cpe:2.3:a:bcfg2:bcfg2:0.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.6.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bcfg2:bcfg2:0.7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.comp.sysutils.bcfg2.devel/4318
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640028
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066070.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066071.html
- http://openwall.com/lists/oss-security/2011/09/01/1
- http://openwall.com/lists/oss-security/2011/09/06/1
- http://secunia.com/advisories/45807
- http://secunia.com/advisories/45926
- http://secunia.com/advisories/46042
- http://www.debian.org/security/2011/dsa-2302
- http://www.securityfocus.com/bid/49414
- https://bugzilla.redhat.com/show_bug.cgi?id=736279
- https://github.com/solj/bcfg2/commit/46795ae451ca6ede55a0edeb726978aef4684b53
- https://github.com/solj/bcfg2/commit/f4a35efec1b6a1e54d61cf1b8bfc83dd1d89eef7
- http://article.gmane.org/gmane.comp.sysutils.bcfg2.devel/4318
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640028
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066070.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066071.html
- http://openwall.com/lists/oss-security/2011/09/01/1
- http://openwall.com/lists/oss-security/2011/09/06/1
- http://secunia.com/advisories/45807
- http://secunia.com/advisories/45926
- http://secunia.com/advisories/46042
- http://www.debian.org/security/2011/dsa-2302
- http://www.securityfocus.com/bid/49414
- https://bugzilla.redhat.com/show_bug.cgi?id=736279
- https://github.com/solj/bcfg2/commit/46795ae451ca6ede55a0edeb726978aef4684b53
- https://github.com/solj/bcfg2/commit/f4a35efec1b6a1e54d61cf1b8bfc83dd1d89eef7



