Vulnerability Details : CVE-2008-4636
yast2-backup 2.14.2 through 2.16.6 on SUSE Linux and Novell Linux allows local users to gain privileges via shell metacharacters in filenames used by the backup process.
Products affected by CVE-2008-4636
- cpe:2.3:o:suse:yast2-backup:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4636
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 55 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4636
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2008-4636
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4636
-
http://www.securityfocus.com/bid/32464
Broken Link;Patch;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/32832
About Secunia Research | FlexeraBroken Link;Patch;Vendor Advisory
-
http://osvdb.org/50284
Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00003.html
[security-announce] SUSE Security Announcement: yast2-backup (SUSE-SA:2008:054) - openSUSE Security Announce - openSUSE Mailing ListsPatch;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46879
yast2-backup backup shell command execution CVE-2008-4636 Vulnerability ReportThird Party Advisory;VDB Entry
Jump to