Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-8B20D716-49DF-11EA-9F7B-206A8A720317: ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection

Back to Search

FreeBSD: VID-8B20D716-49DF-11EA-9F7B-206A8A720317: ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
10/01/2019
Created
02/11/2020
Added
02/08/2020
Modified
02/08/2020

Description

Upstream ksh93 maintainer Siteshwar Vashisht reports:

A flaw was found in the way ksh evaluates certain environment

variables. An attacker could use this flaw to override or bypass

environment restrictions to execute shell commands. Services and

applications that allow remote unauthenticated attackers to

provide one of those environment variables could allow them to

exploit this issue remotely.

Solution(s)

  • freebsd-upgrade-package-ksh93
  • freebsd-upgrade-package-ksh93-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;