CVE-2015-1416
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
05/02/2018
Last modified:
13/03/2018
Description
Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2015/07/30/9
- http://www.openwall.com/lists/oss-security/2015/08/01/4
- http://www.openwall.com/lists/oss-security/2015/08/02/1
- http://www.openwall.com/lists/oss-security/2015/08/02/6
- http://www.securityfocus.com/bid/76116
- http://www.securitytracker.com/id/1033110
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15:14.bsdpatch.asc