Vulnerability Description
In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
CVSS Score
5.5
MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Buc | Traceroute | >= 2.0.12, < 2.1.3 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalatio
- https://security-tracker.debian.org/tracker/CVE-2023-46316Third Party Advisory
- https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/Release Notes
- http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalatio
- https://security-tracker.debian.org/tracker/CVE-2023-46316Third Party Advisory
- https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/Release Notes
FAQ
What is CVE-2023-46316?
CVE-2023-46316 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
How severe is CVE-2023-46316?
CVE-2023-46316 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46316?
Check the references section above for vendor advisories and patch information. Affected products include: Buc Traceroute, Debian Debian Linux.