Vulnerability Description
kiwi before 4.98.05, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in an image name.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suse | Kiwi | <= 4.98.04 |
| Suse | Studio Extension For System Z | 1.2 |
| Suse | Studio Onsite | 1.2 |
References
- http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.htmlVendor Advisory
- http://www.openwall.com/lists/oss-security/2011/11/02/4
- https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019fExploitPatch
- http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.htmlVendor Advisory
- http://www.openwall.com/lists/oss-security/2011/11/02/4
- https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019fExploitPatch
FAQ
What is CVE-2011-4195?
CVE-2011-4195 is a vulnerability with a CVSS score of 7.5 (HIGH). kiwi before 4.98.05, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in ...
How severe is CVE-2011-4195?
CVE-2011-4195 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4195?
Check the references section above for vendor advisories and patch information. Affected products include: Suse Kiwi, Suse Studio Extension For System Z, Suse Studio Onsite.