Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2019-13638: CVE-2019-13638 patch: OS shell command injection when processing crafted patch files (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2019-13638: CVE-2019-13638 patch: OS shell command injection when processing crafted patch files (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/26/2019
Created
09/21/2019
Added
09/20/2019
Modified
12/15/2023

Description

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

Solution(s)

  • redhat-upgrade-patch
  • redhat-upgrade-patch-debuginfo
  • redhat-upgrade-patch-debugsource

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;