First published: Wed Apr 16 2014(Updated: )
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Studio Extension for System z | =1.2 | |
SUSE Studio Onsite | =1.2 | |
Suse Kiwi | <=4.98.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3180 is considered to have a medium severity due to its potential to allow arbitrary command execution.
To fix CVE-2011-3180, update to the latest version of the affected software, specifically kiwi version 4.98.08 or later, or SUSE Studio Onsite and Extension for System z version 1.2.1 or later.
CVE-2011-3180 affects kiwi versions prior to 4.98.08 and SUSE Studio Onsite and Extension for System z versions 1.2 before 1.2.1.
CVE-2011-3180 is a command injection vulnerability that allows attackers to execute arbitrary commands through the misuse of file paths.
Users of the affected versions of SUSE Studio Onsite and extension, as well as those utilizing vulnerable versions of kiwi, are impacted by CVE-2011-3180.