Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2018-1000156

Description

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

POC

Reference

- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html

- http://rachelbythebay.com/w/2018/04/05/bangpatch/

- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19

- https://savannah.gnu.org/bugs/index.php?53566

- https://seclists.org/bugtraq/2019/Aug/29

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/NeXTLinux/vunnel

- https://github.com/anchore/vunnel

- https://github.com/andir/nixos-issue-db-example

- https://github.com/irsl/gnu-patch-vulnerabilities

- https://github.com/khulnasoft-lab/vulnlist

- https://github.com/phonito/phonito-vulnerable-container

- https://github.com/renovate-bot/NeXTLinux-_-vunnel