First published: Wed Apr 16 2014(Updated: )
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Kiwi | <=4.85 | |
SUSE Studio | =1.2 | |
SUSE Studio | =1.2 | |
<=4.85 | ||
=1.2 | ||
=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4192 is considered a critical vulnerability as it allows attackers to execute arbitrary commands.
To fix CVE-2011-4192, upgrade to kiwi version 4.85.1 or later, and update SUSE Studio Onsite and SUSE Studio Extension for System z to version 1.2.1 or later.
CVE-2011-4192 affects Suse Kiwi versions up to 4.85, SUSE Studio Onsite version 1.2, and SUSE Studio Extension for System z version 1.2.
The potential impacts of CVE-2011-4192 include unauthorized command execution, which can lead to system compromise.
There is no known workaround for CVE-2011-4192; the only solution is to apply the security updates.