9.3
CVSSv2

CVE-2019-13638

Published: 26/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

GNU patch up to and including 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu patch 2.7.6

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several security issues were fixed in Patch ...
Several security issues were fixed in Patch ...
Synopsis Important: patch security update Type/Severity Security Advisory: Important Topic An update for patch is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: patch security update Type/Severity Security Advisory: Important Topic An update for patch is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, whi ...
Synopsis Important: patch security update Type/Severity Security Advisory: Important Topic An update for patch is now available for Red Hat Enterprise Linux 76 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: patch security update Type/Severity Security Advisory: Important Topic An update for patch is now available for Red Hat Enterprise Linux 74 Advanced Update Support, Red Hat Enterprise Linux 74 Telco Extended Update Support, and Red Hat Enterprise Linux 74 Update Services for SAP Solut ...
Synopsis Important: patch security update Type/Severity Security Advisory: Important Topic An update for patch is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, whi ...
Imre Rad discovered several vulnerabilities in GNU patch, leading to shell command injection or escape from the working directory and access and overwrite files, if specially crafted patch files are processed This update includes a bugfix for a regression introduced by the patch to address CVE-2018-1000156 when applying an ed-style patch (#933140) ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
Impact: Moderate Public Date: 2019-07-29 CWE: CWE-78 Bugzilla: 1733916: CVE-2019-13638 patch: OS shell ...

Github Repositories

The GNU patch utility was prone vulnerable to multiple attacks through version 2.7.6. You can find my related PoC files here.

GNU patch vulnerabilities I identified several vulnerabilities in the GNU patch utility, some of them making it possible to execute arbitrary code if the victim opens a crafted patch file It also turned out, some of these vulnerabilities had been silently addressed by the maintainer back then in 2018 when CVE-2018-1000156 was reported by pushing some additional commits the sam