UBUNTU-CVE-2017-1000117

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2017-1000117
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-1000117.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-1000117
Related
Published
2017-08-10T00:00:00Z
Modified
2017-08-10T00:00:00Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

References

Affected packages

Ubuntu:14.04:LTS / git

Package

Name
git
Purl
pkg:deb/ubuntu/git@1:1.9.1-1ubuntu0.6?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.9.1-1ubuntu0.6

Affected versions

1:1.*

1:1.8.3.2-1
1:1.8.4.2-1
1:1.8.4.3-1
1:1.8.4.4-1
1:1.8.5-1
1:1.8.5.1-1
1:1.8.5.2-1
1:1.8.5.2-2
1:1.8.5.3-1
1:1.9~rc1-1
1:1.9.0-1
1:1.9.1-1
1:1.9.1-1ubuntu0.1
1:1.9.1-1ubuntu0.2
1:1.9.1-1ubuntu0.3
1:1.9.1-1ubuntu0.4
1:1.9.1-1ubuntu0.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "git-core": "1:1.9.1-1ubuntu0.6",
            "git-daemon-run": "1:1.9.1-1ubuntu0.6",
            "git-email": "1:1.9.1-1ubuntu0.6",
            "git-mediawiki": "1:1.9.1-1ubuntu0.6",
            "git": "1:1.9.1-1ubuntu0.6",
            "git-el": "1:1.9.1-1ubuntu0.6",
            "git-cvs": "1:1.9.1-1ubuntu0.6",
            "git-bzr": "1:1.9.1-1ubuntu0.6",
            "gitk": "1:1.9.1-1ubuntu0.6",
            "git-doc": "1:1.9.1-1ubuntu0.6",
            "git-arch": "1:1.9.1-1ubuntu0.6",
            "git-daemon-sysvinit": "1:1.9.1-1ubuntu0.6",
            "git-svn": "1:1.9.1-1ubuntu0.6",
            "git-gui": "1:1.9.1-1ubuntu0.6",
            "git-man": "1:1.9.1-1ubuntu0.6",
            "gitweb": "1:1.9.1-1ubuntu0.6",
            "git-all": "1:1.9.1-1ubuntu0.6"
        }
    ]
}

Ubuntu:16.04:LTS / git

Package

Name
git
Purl
pkg:deb/ubuntu/git@1:2.7.4-0ubuntu1.2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.7.4-0ubuntu1.2

Affected versions

1:2.*

1:2.5.0-1
1:2.6.2-1
1:2.6.3-1
1:2.6.4-1
1:2.7.0~rc3-1
1:2.7.0-1
1:2.7.3-0ubuntu1
1:2.7.4-0ubuntu1
1:2.7.4-0ubuntu1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "git-core": "1:2.7.4-0ubuntu1.2",
            "git-daemon-run": "1:2.7.4-0ubuntu1.2",
            "git-email": "1:2.7.4-0ubuntu1.2",
            "git-mediawiki": "1:2.7.4-0ubuntu1.2",
            "git": "1:2.7.4-0ubuntu1.2",
            "git-el": "1:2.7.4-0ubuntu1.2",
            "git-cvs": "1:2.7.4-0ubuntu1.2",
            "git-doc": "1:2.7.4-0ubuntu1.2",
            "gitk": "1:2.7.4-0ubuntu1.2",
            "git-arch": "1:2.7.4-0ubuntu1.2",
            "git-daemon-sysvinit": "1:2.7.4-0ubuntu1.2",
            "git-svn": "1:2.7.4-0ubuntu1.2",
            "git-gui": "1:2.7.4-0ubuntu1.2",
            "git-man": "1:2.7.4-0ubuntu1.2",
            "gitweb": "1:2.7.4-0ubuntu1.2",
            "git-all": "1:2.7.4-0ubuntu1.2"
        }
    ]
}