CVE-2016-6902

lshell 0.9.16 allows remote authenticated users to break out of a limited shell and execute arbitrary commands.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/08/22/17 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/92591 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834949 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1369345 Issue Tracking Patch
https://github.com/ghantoos/lshell/commit/a686f71732a3d0f16df52ef46ab8a49ee0083c68 Issue Tracking Patch Third Party Advisory
https://github.com/ghantoos/lshell/issues/147 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/08/22/17 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/92591 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834949 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1369345 Issue Tracking Patch
https://github.com/ghantoos/lshell/commit/a686f71732a3d0f16df52ef46ab8a49ee0083c68 Issue Tracking Patch Third Party Advisory
https://github.com/ghantoos/lshell/issues/147 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lshell_project:lshell:0.9.16:*:*:*:*:*:*:*

History

21 Nov 2024, 02:57

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/08/22/17 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/08/22/17 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/92591 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92591 - Third Party Advisory, VDB Entry
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834949 - Issue Tracking, Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834949 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1369345 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1369345 - Issue Tracking, Patch
References () https://github.com/ghantoos/lshell/commit/a686f71732a3d0f16df52ef46ab8a49ee0083c68 - Issue Tracking, Patch, Third Party Advisory () https://github.com/ghantoos/lshell/commit/a686f71732a3d0f16df52ef46ab8a49ee0083c68 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/ghantoos/lshell/issues/147 - Issue Tracking, Patch, Third Party Advisory () https://github.com/ghantoos/lshell/issues/147 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-04-24 19:59

Updated : 2024-11-21 02:57


NVD link : CVE-2016-6902

Mitre link : CVE-2016-6902

CVE.ORG link : CVE-2016-6902


JSON object : View

Products Affected

lshell_project

  • lshell
CWE
CWE-264

Permissions, Privileges, and Access Controls