vulnerability
Arch Linux: Arbitrary command execution (CVE-2017-14500)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Sep 17, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Sep 17, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp. When the user plays the file in Podbeuter, the shell code will be executed.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-14500
- https://attackerkb.com/topics/CVE-2017-14500
- URL-http://openwall.com/lists/oss-security/2017/09/16/1
- URL-http://www.debian.org/security/2017/dsa-3977
- URL-https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333
- URL-https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
- URL-https://github.com/akrennmair/newsbeuter/issues/598
- URL-https://security.archlinux.org/ASA-201709-11
- URL-https://usn.ubuntu.com/4585-1/
- CWE-78
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.