CVE-2017-14176
Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.
Published
2017-11-27T10:29:00.207
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 8.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14176.html
Issue Tracking, Vendor Advisory
([email protected])
-
http://www.ubuntu.com/usn/usn-3411-1
Issue Tracking, Vendor Advisory
([email protected])
-
https://bugs.debian.org/874429
Issue Tracking, Third Party Advisory
([email protected])
-
https://bugs.launchpad.net/bzr/+bug/1710979
Issue Tracking, Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://bugzilla.suse.com/show_bug.cgi?id=1058214
Issue Tracking, Third Party Advisory
([email protected])
-
https://www.debian.org/security/2017/dsa-4052
Issue Tracking, Third Party Advisory
([email protected])
-
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14176.html
Issue Tracking, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.ubuntu.com/usn/usn-3411-1
Issue Tracking, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.debian.org/874429
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.launchpad.net/bzr/+bug/1710979
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.suse.com/show_bug.cgi?id=1058214
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2017/dsa-4052
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)