CVE-2012-2242

CVSS V2 Medium 6.8 CVSS V3 None
Description
scripts/dget.pl in devscripts before 2.10.73 allows remote attackers to execute arbitrary commands via a crafted (1) .dsc or (2) .changes file, related to "arguments to external commands" that are not properly escaped, a different vulnerability than CVE-2012-2240.
Overview
  • CVE ID
  • CVE-2012-2242
  • Assigner
  • security@debian.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2012-10-01T00:55:01
  • Last Modified Date
  • 2013-04-19T03:21:27
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:* 1 OR 2.10.72
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze1:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze2:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze3:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze4:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.70:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.71:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 10:45:52 Added to TrackCVE