vulnerability
FreeBSD: VID-8b20d716-49df-11ea-9f7b-206a8a720317: ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Feb 7, 2020 | Feb 8, 2020 | Dec 10, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Feb 7, 2020
Added
Feb 8, 2020
Modified
Dec 10, 2025
Description
Upstream ksh93 maintainer Siteshwar Vashisht reports: A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
Solutions
freebsd-upgrade-package-ksh93freebsd-upgrade-package-ksh93-devel
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.