First published: Mon Feb 05 2018(Updated: )
The do_ed_script function in pch.c in GNU patch through 2.7.6, and patch in FreeBSD 10.1 before 10.1-RELEASE-p17, 10.2 before 10.2-BETA2-p3, 10.2-RC1 before 10.2-RC1-p2, and 0.2-RC2 before 10.2-RC2-p1, allows remote attackers to execute arbitrary commands via a crafted patch file, because a '!' character can be passed to the ed program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =10.1 | |
FreeBSD Kernel | =10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1418 has been classified as a high severity vulnerability due to its potential for remote code execution.
You can fix CVE-2015-1418 by updating to a patched version of GNU patch or FreeBSD that addresses this vulnerability.
CVE-2015-1418 affects GNU patch up to version 2.7.6 and specific versions of FreeBSD including 10.1 and 10.2.
An attacker can exploit CVE-2015-1418 by crafting a malicious patch file that sends arbitrary commands to be executed.
Currently, there are no known effective workarounds for CVE-2015-1418, so updating is strongly recommended.