CVE-2015-7545
Published: 9 December 2015
The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule.
Priority
Status
Package | Release | Status |
---|---|---|
git Launchpad, Ubuntu, Debian |
precise |
Released
(1:1.7.9.5-1ubuntu0.2)
|
trusty |
Released
(1:1.9.1-1ubuntu0.2)
|
|
upstream |
Released
(1:2.6.1-1)
|
|
vivid |
Released
(1:2.1.4-2.1ubuntu0.1)
|
|
wily |
Released
(1:2.5.0-1ubuntu0.1)
|
|
Patches: upstream: https://github.com/git/git/commit/a5adaced2e13c135d5d9cc65be9eb95aa3bacedf upstream: https://github.com/git/git/commit/33cfccbbf35a56e190b79bdec5c85457c952a021 upstream: https://github.com/git/git/commit/5088d3b38775f8ac12d7f77636775b16059b67ef upstream: https://github.com/git/git/commit/f4113cac0c88b4f36ee6f3abf3218034440a68e3 upstream: https://github.com/git/git/commit/b258116462399b318c86165c61a5c7123043cfd4 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- http://seclists.org/oss-sec/2015/q4/67
- http://www.openwall.com/lists/oss-security/2015/10/06/1
- http://www.openwall.com/lists/oss-security/2015/12/08/5
- http://www.openwall.com/lists/oss-security/2015/12/09/7
- https://ubuntu.com/security/notices/USN-2835-1
- https://www.cve.org/CVERecord?id=CVE-2015-7545
- NVD
- Launchpad
- Debian