First published: Mon Dec 09 2019(Updated: )
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/git | 1:2.20.1-2+deb10u3 1:2.20.1-2+deb10u8 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.42.0-1 | |
redhat/git | <2.24.1 | 2.24.1 |
redhat/git | <2.23.1 | 2.23.1 |
redhat/git | <2.21.1 | 2.21.1 |
redhat/git | <2.20.2 | 2.20.2 |
redhat/git | <2.19.3 | 2.19.3 |
redhat/git | <2.18.2 | 2.18.2 |
redhat/git | <2.17.3 | 2.17.3 |
redhat/git | <2.16.6 | 2.16.6 |
redhat/git | <2.15.4 | 2.15.4 |
redhat/git | <2.14.6 | 2.14.6 |
Visual Studio Professional 2017 | >=15.0<15.9.18 | |
Visual Studio Professional 2019 | >=16.0<16.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1349 is classified as a remote code execution vulnerability.
To fix CVE-2019-1349, update Git to the recommended versions listed in the advisory.
CVE-2019-1349 affects Git for Visual Studio and certain versions of Git on Debian and Red Hat.
Yes, CVE-2019-1349 can allow an attacker to execute arbitrary commands on the vulnerable system.
The potential impacts of CVE-2019-1349 include unauthorized access and control over the affected systems.