CVE-2022-1271
CVSS V2 None
CVSS V3 High 8.8
Description
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Overview
- CVE ID
- CVE-2022-1271
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-08-31T16:15:09
- Last Modified Date
- 2022-10-07T14:14:24
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:* | 1 | OR | 1.12 | |
cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2022-1271 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2073310 | Issue Tracking Third Party Advisory |
https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6 | Mailing List Patch Third Party Advisory |
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html | Mailing List Patch Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2022-1271 | Third Party Advisory |
https://security.gentoo.org/glsa/202209-01 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220930-0006/ | Third Party Advisory |
https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/04/07/8 | Mailing List Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-1271 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-08-31 17:00:07 | Added to TrackCVE |