gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
Source: MITRE
Published: 2017-12-14
Updated: 2020-08-08
Type: CWE-74
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
139437 | GLSA-202008-02 : GNU GLOBAL: Arbitrary code execution | Nessus | Gentoo Local Security Checks | medium |
106017 | Fedora 27 : global (2017-fd9462d9ef) | Nessus | Fedora Local Security Checks | medium |
105478 | openSUSE Security Update : global (openSUSE-2017-1420) | Nessus | SuSE Local Security Checks | medium |
105337 | FreeBSD : global -- gozilla vulnerability (48cca164-e269-11e7-be51-6599c735afc8) | Nessus | FreeBSD Local Security Checks | medium |