FreeBSD : ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (8b20d716-49df-11ea-9f7b-206a8a720317)

high Nessus Plugin ID 133588

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Upstream ksh93 maintainer Siteshwar Vashisht reports :

A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1757324

https://access.redhat.com/security/cve/CVE-2019-14868

https://access.redhat.com/errata/RHSA-2020:0431

http://www.nessus.org/u?a3d085cb

Plugin Details

Severity: High

ID: 133588

File Name: freebsd_pkg_8b20d71649df11ea9f7b206a8a720317.nasl

Version: 1.2

Type: local

Published: 2/10/2020

Updated: 2/24/2020

Dependencies: ssh_get_info.nasl

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ksh93, p-cpe:/a:freebsd:freebsd:ksh93-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/7/2020

Vulnerability Publication Date: 10/1/2019