First published: Sat Feb 19 2022(Updated: )
duck before 0.10 did not properly handle loading of untrusted code from the current directory.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Duck | <0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1239 is classified as a medium severity vulnerability due to its potential for code execution from untrusted sources.
To fix CVE-2016-1239, upgrade Duck to version 0.10 or later.
CVE-2016-1239 affects Duck versions prior to 0.10, specifically in Debian systems.
Yes, CVE-2016-1239 can lead to remote code execution if untrusted code is loaded from the current directory.
The responsibility for patching CVE-2016-1239 lies with the software maintainers and users of the affected versions.