7.5
CVSSv2

CVE-2012-5534

Published: 03/12/2012 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The hook_process function in the plugin API for WeeChat 0.3.0 up to and including 0.3.9.1 allows remote malicious users to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."

Vulnerable Product Search on Vulmon Subscribe to Product

flashtux weechat 0.3.9

flashtux weechat 0.3.1

flashtux weechat 0.3.2

flashtux weechat 0.3.9.1

flashtux weechat 0.3.4

flashtux weechat 0.3.0

flashtux weechat 0.3.1.1

flashtux weechat 0.3.7

flashtux weechat 0.3.8

flashtux weechat 0.3.6

flashtux weechat 0.3.3

Vendor Advisories

Debian Bug report logs - #693026 [CVE-2012-5854] weechat: Buffer overflow Package: weechat; Maintainer for weechat is Emmanuel Bouthenot <kolter@debianorg>; Source for weechat is src:weechat (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 12 Nov 2012 07:57:01 UTC Severity: grave Ta ...
Two security issues have been discovered in WeeChat, a fast, light and extensible chat client: CVE-2011-1428 X509 certificates were incorrectly validated CVE-2012-5534 The hook_process function in the plugin API allowed the execution of arbitrary shell commands For the stable distribution (squeeze), these problems have been fixed in v ...