Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
References
Link | Resource |
---|---|
https://tracker.debian.org/news/882440 | Issue Tracking Third Party Advisory |
https://www.dulwich.io/code/dulwich/ | Product Vendor Advisory |
https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/ | Issue Tracking Patch Vendor Advisory |
https://tracker.debian.org/news/882440 | Issue Tracking Third Party Advisory |
https://www.dulwich.io/code/dulwich/ | Product Vendor Advisory |
https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/ | Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://tracker.debian.org/news/882440 - Issue Tracking, Third Party Advisory | |
References | () https://www.dulwich.io/code/dulwich/ - Product, Vendor Advisory | |
References | () https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/ - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2017-10-29 20:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16228
Mitre link : CVE-2017-16228
CVE.ORG link : CVE-2017-16228
JSON object : View
Products Affected
dulwich_project
- dulwich
CWE