cvelist/2015/1xxx/CVE-2015-1416.json

93 lines
2.9 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2015-1416",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20150730 CVE-2015-1416: vulnerability in patch(1)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/07/30/9"
},
{
"name" : "[oss-security] 20150801 Re: CVE-2015-1416: vulnerability in patch(1)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/01/4"
},
{
"name" : "[oss-security] 20150801 Re: CVE-2015-1416: vulnerability in patch(1)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/02/1"
},
{
"name" : "[oss-security] 20150802 Re: CVE-2015-1416: vulnerability in patch(1)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/08/02/6"
},
{
"name" : "FreeBSD-SA-15:14",
"refsource" : "FREEBSD",
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:14.bsdpatch.asc"
},
{
"name" : "76116",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76116"
},
{
"name" : "1033110",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033110"
}
]
}
}