CPANSA-UI-Dialog-2008-7315: UI-Dialog vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2017-10-10T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2017-10-10T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 9.8 | Severity | Critical |
Original language | Language | en | |
Also referred to |
Vulnerability Description
UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.
Vulnerabilities
CVE-2008-7315
Vulnerability DescriptionUI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.
Weakness | CWE-77 : Improper Neutralization of Special Elements used in a Command ('Command Injection') |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
UI-Dialog less than or equal 1.09 |
|
Fixed
- UI-Dialog greater than 1.09
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-UI-Dialog-2008-7315 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2017/cpansa-ui-dialog-2008-7315.json - https://security-tracker.debian.org/tracker/CVE-2008-7315/ external
https://security-tracker.debian.org/tracker/CVE-2008-7315/ - https://rt.cpan.org/Public/Bug/Display.html?id=107364 external
https://rt.cpan.org/Public/Bug/Display.html?id=107364 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448 external
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448 - http://www.securityfocus.com/bid/77031/info external
http://www.securityfocus.com/bid/77031/info - http://www.openwall.com/lists/oss-security/2015/10/08/6 external
http://www.openwall.com/lists/oss-security/2015/10/08/6 - CVE-2008-7315 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2008-7315
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Tue Oct 10 00:00:00 2017 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/