cvelist/2015/1xxx/CVE-2015-1418.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:20:58 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-1418",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-02-05 11:02:38 -05:00
{
2019-03-17 23:20:58 +00:00
"lang": "eng",
"value": "The do_ed_script function in pch.c in GNU patch through 2.7.6, and patch in FreeBSD 10.1 before 10.1-RELEASE-p17, 10.2 before 10.2-BETA2-p3, 10.2-RC1 before 10.2-RC1-p2, and 0.2-RC2 before 10.2-RC2-p1, allows remote attackers to execute arbitrary commands via a crafted patch file, because a '!' character can be passed to the ed program."
2018-02-05 11:02:38 -05:00
}
2019-03-17 23:20:58 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/013_patch.patch.sig",
"refsource": "MISC",
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/013_patch.patch.sig"
},
{
"name": "76236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76236"
},
{
"name": "1033188",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033188"
},
{
"name": "FreeBSD-SA-15:18",
"refsource": "FREEBSD",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:18.bsdpatch.asc"
},
{
"name": "http://rachelbythebay.com/w/2018/04/05/bangpatch/",
"refsource": "MISC",
"url": "http://rachelbythebay.com/w/2018/04/05/bangpatch/"
},
{
"name": "https://bugs.debian.org/894667",
"refsource": "MISC",
"url": "https://bugs.debian.org/894667"
}
]
}
}