HIGH · 7.5

CVE-2017-12836

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=...

Vulnerability Description

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GnuCvs1.12.1
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0

References

FAQ

What is CVE-2017-12836?

CVE-2017-12836 is a vulnerability with a CVSS score of 7.5 (HIGH). CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=...

How severe is CVE-2017-12836?

CVE-2017-12836 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-12836?

Check the references section above for vendor advisories and patch information. Affected products include: Gnu Cvs, Canonical Ubuntu Linux, Debian Debian Linux.