CVE-2017-12836

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
References
Link Resource
http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html Exploit Mailing List Vendor Advisory
http://www.debian.org/security/2017/dsa-3940 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/08/11/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/08/11/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/100279 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3399-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1480800 Issue Tracking Patch Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201709-17 Third Party Advisory
http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html Exploit Mailing List Vendor Advisory
http://www.debian.org/security/2017/dsa-3940 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/08/11/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/08/11/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/100279 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3399-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1480800 Issue Tracking Patch Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201709-17 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:cvs:1.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cvs:1.12.13:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:10

Type Values Removed Values Added
References () http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html - Exploit, Mailing List, Vendor Advisory () http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html - Exploit, Mailing List, Vendor Advisory
References () http://www.debian.org/security/2017/dsa-3940 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3940 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/08/11/1 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/08/11/1 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/08/11/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/08/11/4 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/100279 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100279 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3399-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3399-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1480800 - Issue Tracking, Patch, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1480800 - Issue Tracking, Patch, Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201709-17 - Third Party Advisory () https://security.gentoo.org/glsa/201709-17 - Third Party Advisory

Information

Published : 2017-08-24 14:29

Updated : 2024-11-21 03:10


NVD link : CVE-2017-12836

Mitre link : CVE-2017-12836

CVE.ORG link : CVE-2017-12836


JSON object : View

Products Affected

gnu

  • cvs

canonical

  • ubuntu_linux

debian

  • debian_linux