CVE-2017-12836
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/08/2017
Last modified:
20/04/2025
Description
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:cvs:1.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:cvs:1.12.13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html
- http://www.debian.org/security/2017/dsa-3940
- http://www.openwall.com/lists/oss-security/2017/08/11/1
- http://www.openwall.com/lists/oss-security/2017/08/11/4
- http://www.securityfocus.com/bid/100279
- http://www.ubuntu.com/usn/USN-3399-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1480800
- https://security.gentoo.org/glsa/201709-17
- http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html
- http://www.debian.org/security/2017/dsa-3940
- http://www.openwall.com/lists/oss-security/2017/08/11/1
- http://www.openwall.com/lists/oss-security/2017/08/11/4
- http://www.securityfocus.com/bid/100279
- http://www.ubuntu.com/usn/USN-3399-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1480800
- https://security.gentoo.org/glsa/201709-17



