CVE-2017-17531

MEDIUM

Description

gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.

References

https://security.gentoo.org/glsa/202008-02

https://security-tracker.debian.org/tracker/CVE-2017-17531

Details

Source: MITRE

Published: 2017-12-14

Updated: 2020-08-08

Type: CWE-74

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:gnu:global:4.8.6:*:*:*:*:*:*:*

Tenable Plugins

View all (4 total)

IDNameProductFamilySeverity
139437GLSA-202008-02 : GNU GLOBAL: Arbitrary code executionNessusGentoo Local Security Checks
medium
106017Fedora 27 : global (2017-fd9462d9ef)NessusFedora Local Security Checks
medium
105478openSUSE Security Update : global (openSUSE-2017-1420)NessusSuSE Local Security Checks
medium
105337FreeBSD : global -- gozilla vulnerability (48cca164-e269-11e7-be51-6599c735afc8)NessusFreeBSD Local Security Checks
medium