CVE-2019-14868

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ksh_project:ksh:20120801:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : 7.8
v2 : 7.2
v3 : 7.4
References () http://seclists.org/fulldisclosure/2020/May/53 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/May/53 - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14868 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14868 - Issue Tracking, Third Party Advisory
References () https://github.com/att/ast/commit/c7de8b641266bac7c77942239ac659edfee9ecd2 - Patch, Third Party Advisory () https://github.com/att/ast/commit/c7de8b641266bac7c77942239ac659edfee9ecd2 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/07/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/07/msg00015.html - Mailing List, Third Party Advisory
References () https://support.apple.com/kb/HT211170 - Third Party Advisory () https://support.apple.com/kb/HT211170 - Third Party Advisory

Information

Published : 2020-04-02 17:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14868

Mitre link : CVE-2019-14868

CVE.ORG link : CVE-2019-14868


JSON object : View

Products Affected

ksh_project

  • ksh

debian

  • debian_linux

apple

  • mac_os_x
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')