FreeBSD : Git -- Execute arbitrary code (7f645ee5-7681-11e5-8519-005056ac623e)

critical Nessus Plugin ID 86450

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Git release notes :

Some protocols (like git-remote-ext) can execute arbitrary code found in the URL. The URLs that submodules use may come from arbitrary sources (e.g., .gitmodules files in a remote repository), and can hurt those who blindly enable recursive fetch. Restrict the allowed protocols to well known and safe ones.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?a9deaeb2

https://www.openwall.com/lists/oss-security/2015/12/11/7

http://www.nessus.org/u?87077dab

Plugin Details

Severity: Critical

ID: 86450

File Name: freebsd_pkg_7f645ee5768111e58519005056ac623e.nasl

Version: 2.8

Type: local

Published: 10/20/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:git, p-cpe:/a:freebsd:freebsd:git-gui, p-cpe:/a:freebsd:freebsd:git-lite, p-cpe:/a:freebsd:freebsd:git-subversion, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/19/2015

Vulnerability Publication Date: 9/23/2015

Reference Information

CVE: CVE-2015-7545