EulerOS 2.0 SP1 : git (EulerOS-SA-2017-1187)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the git package installed, the EulerOS
installation on the remote host is affected by the following
vulnerabilities :

- It was found that the script shipped with
git failed to correctly handle branch names containing
special characters. A specially crafted git repository
could use this flaw to execute arbitrary commands if a
user working with the repository configured their shell
to include repository information in the prompt.

- A flaw was found in the way git-shell handled
command-line options for the restricted set of
git-shell commands. A remote, authenticated attacker
could use this flaw to bypass git-shell restrictions,
to view and manipulate files, by abusing the instance
of the less command launched using crafted command-line
options. (CVE-2017-8386)

- A shell command injection flaw related to the handling
of ''ssh'' URLs has been discovered in Git. An attacker
could use this flaw to execute shell commands with the
privileges of the user running the Git client, for
example, when performing a ''clone'' action on a
malicious repository or a legitimate repository
containing a malicious commit. (CVE-2017-1000117)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

Solution :

Update the affected git packages.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true

Family: Huawei Local Security Checks

Nessus Plugin ID: 103025 ()

Bugtraq ID:

CVE ID: CVE-2014-9938

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now