Executive Summary

Informations
Name CVE-2013-4479 First vendor Publication 2013-12-07
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

lib/sup/message_chunks.rb in Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the content_type of an email attachment.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4479

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20138
 
Oval ID: oval:org.mitre.oval:def:20138
Title: DSA-2805-1 sup-mail - remote command injection
Description: joernchen of Phenoelit discovered two command injection flaws in Sup, a console-based email client. An attacker might execute arbitrary command if the user opens a maliciously crafted email.
Family: unix Class: patch
Reference(s): DSA-2805-1
CVE-2013-4478
CVE-2013-4479
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): sup-mail
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

Nessus® Vulnerability Scanner

Date Description
2015-09-08 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-14929.nasl - Type : ACT_GATHER_INFO
2013-11-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2805.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://lists.fedoraproject.org/pipermail/package-announce/2015-September/1659...
http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html
http://seclists.org/fulldisclosure/2013/Oct/272
http://secunia.com/advisories/55294
http://secunia.com/advisories/55400
http://www.debian.org/security/2012/dsa-2805
http://www.openwall.com/lists/oss-security/2013/10/30/2
https://github.com/sup-heliotrope/sup/commit/ca0302e0c716682d2de22e9136400c70...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 12:36:23
  • Multiple Updates
2021-05-04 12:27:20
  • Multiple Updates
2021-04-22 01:33:06
  • Multiple Updates
2020-05-23 00:38:03
  • Multiple Updates
2016-12-22 09:23:33
  • Multiple Updates
2016-04-26 23:33:36
  • Multiple Updates
2015-09-09 13:25:56
  • Multiple Updates
2014-02-17 11:22:16
  • Multiple Updates
2013-12-09 21:20:18
  • Multiple Updates
2013-12-08 00:19:15
  • First insertion