FreeBSD : ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (8b20d716-49df-11ea-9f7b-206a8a720317)

High Nessus Plugin ID 133588

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Upstream ksh93 maintainer Siteshwar Vashisht reports :

A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1757324

https://access.redhat.com/security/cve/CVE-2019-14868

https://access.redhat.com/errata/RHSA-2020:0431

http://www.nessus.org/u?a3d085cb

Plugin Details

Severity: High

ID: 133588

File Name: freebsd_pkg_8b20d71649df11ea9f7b206a8a720317.nasl

Version: 1.2

Type: local

Published: 2020/02/10

Updated: 2020/02/24

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ksh93, p-cpe:/a:freebsd:freebsd:ksh93-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2020/02/07

Vulnerability Publication Date: 2019/10/01