Vulnerability Description
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Patch | 2.7.6 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 6.4 |
| Redhat | Enterprise Linux Server Eus | 6.7 |
| Redhat | Enterprise Linux Server Tus | 6.6 |
| Redhat | Enterprise Linux Workstation | 6.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Director
- http://rachelbythebay.com/w/2018/04/05/bangpatch/Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1199Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1200Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2091Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2092Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2093Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2094Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2095Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2096Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2097Third Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/04/msg00013.htmlMailing ListThird Party Advisory
- https://savannah.gnu.org/bugs/index.php?53566Vendor Advisory
- https://seclists.org/bugtraq/2019/Aug/29
FAQ
What is CVE-2018-1000156?
CVE-2018-1000156 is a vulnerability with a CVSS score of 7.8 (HIGH). GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear t...
How severe is CVE-2018-1000156?
CVE-2018-1000156 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000156?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Patch, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.