First published: Wed Dec 11 2019(Updated: )
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/git | 1:2.20.1-2+deb10u3 1:2.20.1-2+deb10u8 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.42.0-1 | |
Microsoft Visual Studio 2017 | >=15.0<15.9.18 | |
Microsoft Visual Studio 2019 | >=16.0<16.4.1 | |
redhat/git | <2.24.1 | 2.24.1 |
redhat/git | <2.23.1 | 2.23.1 |
redhat/git | <2.21.1 | 2.21.1 |
redhat/git | <2.20.2 | 2.20.2 |
redhat/git | <2.19.3 | 2.19.3 |
redhat/git | <2.18.2 | 2.18.2 |
redhat/git | <2.17.3 | 2.17.3 |
redhat/git | <2.16.6 | 2.16.6 |
redhat/git | <2.15.4 | 2.15.4 |
redhat/git | <2.14.6 | 2.14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1352 is a remote code execution vulnerability in Git for Visual Studio.
CVE-2019-1352 has a severity rating of 8.8, which is considered critical.
CVE-2019-1352 affects Git for Visual Studio 2017 and 2019, as well as certain versions of Git for Debian and Red Hat.
To fix CVE-2019-1352, you should update to the recommended versions of Git for Visual Studio, Debian, or Red Hat.
You can find more information about CVE-2019-1352 in the references provided.