CVE-2011-4195

kiwi before 4.98.05, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in an image name.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:suse:kiwi:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:studio_extension_for_system_z:1.2:*:*:*:*:*:*:*
cpe:2.3:a:suse:studio_onsite:1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html - Vendor Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2011/11/02/4 - () http://www.openwall.com/lists/oss-security/2011/11/02/4 -
References () https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019f - Exploit, Patch () https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019f - Exploit, Patch

Information

Published : 2014-04-16 18:37

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4195

Mitre link : CVE-2011-4195

CVE.ORG link : CVE-2011-4195


JSON object : View

Products Affected

suse

  • kiwi
  • studio_onsite
  • studio_extension_for_system_z