CVE-2011-4182
CVSSN/A
发布时间 :2018-06-12 11:29:00
修订时间 :2018-06-12 11:29:00
NMO    

[原文]Missing escaping of ESSID values in sysconfig of SUSE Linux Enterprise allows attackers controlling an access point to cause execute arbitrary code. Affected releases are sysconfig prior to 0.83.7-2.1.


[CNNVD]CNNVD数据暂缺。


[机译]**储备**候选人由一个组织或个人将使用它宣布了新的安全问题时,已预留。

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4182
(官方数据源) NVD

- 其它链接及资源

https://bugzilla.suse.com/show_bug.cgi?id=735394
(UNKNOWN)  CONFIRM  https://bugzilla.suse.com/show_bug.cgi?id=735394
https://www.suse.com/security/cve/CVE-2017-15710/
(UNKNOWN)  CONFIRM  https://www.suse.com/security/cve/CVE-2017-15710/

- 漏洞信息

79001
SUSE sysconfig ifup-services Shell Meta-character SSID Parsing Remote Shell Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Unknown Vendor Verified

- 漏洞描述

SUSE sysconfig contains a flaw related to the ifup-services script. The issue is due to certain shell meta-characters not being stripped or escaped when connecting to a WiFi access point. With a specially crafted SSID, a remote attacker can potentially execute arbitrary shell commands.

- 时间线

2012-02-09 Unknow
Unknow 2012-02-09

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, SUSE has released a patch to address this vulnerability. Check the vendor changelog in the references section.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站