First published: Mon May 09 2016(Updated: )
The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mercurial | <3.8 | 3.8 |
Debian Linux | =8.0 | |
Mercurial | <=3.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3105 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2016-3105, upgrade to Mercurial version 3.8 or later.
Mercurial versions prior to 3.8, specifically those up to and including 3.7.3, are affected by CVE-2016-3105.
Yes, CVE-2016-3105 can be exploited remotely by context-dependent attackers through a crafted git repository name.
CVE-2016-3105 can lead to the execution of arbitrary code on affected systems, compromising their integrity.