CVE-2012-5534

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
References
Link Resource
http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html
http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html
http://secunia.com/advisories/51294 Vendor Advisory
http://secunia.com/advisories/51377
http://weechat.org/security/ Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:136
http://www.openwall.com/lists/oss-security/2012/11/19/4
http://www.securityfocus.com/bid/56584
https://savannah.nongnu.org/bugs/?37764
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0347
http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html
http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html
http://secunia.com/advisories/51294 Vendor Advisory
http://secunia.com/advisories/51377
http://weechat.org/security/ Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:136
http://www.openwall.com/lists/oss-security/2012/11/19/4
http://www.securityfocus.com/bid/56584
https://savannah.nongnu.org/bugs/?37764
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0347
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:flashtux:weechat:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.9:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a - () http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html -
References () http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html - () http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html -
References () http://secunia.com/advisories/51294 - Vendor Advisory () http://secunia.com/advisories/51294 - Vendor Advisory
References () http://secunia.com/advisories/51377 - () http://secunia.com/advisories/51377 -
References () http://weechat.org/security/ - Patch, Vendor Advisory () http://weechat.org/security/ - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:136 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:136 -
References () http://www.openwall.com/lists/oss-security/2012/11/19/4 - () http://www.openwall.com/lists/oss-security/2012/11/19/4 -
References () http://www.securityfocus.com/bid/56584 - () http://www.securityfocus.com/bid/56584 -
References () https://savannah.nongnu.org/bugs/?37764 - () https://savannah.nongnu.org/bugs/?37764 -
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0347 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0347 -

Information

Published : 2012-12-03 21:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5534

Mitre link : CVE-2012-5534

CVE.ORG link : CVE-2012-5534


JSON object : View

Products Affected

flashtux

  • weechat
CWE
CWE-20

Improper Input Validation