Remote Code injection in Barracuda Email Security Gateway(CVE-2023-2868)

admin 2023-11-29 23:22:06 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Remote Code injection in Barracuda Email Security Gateway(CVE-2023-2868)

CVE编号

CVE-2023-2868

利用情况

暂无

补丁情况

N/A

披露时间

2023-05-25
漏洞描述
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://status.barracuda.com/incidents/34kx82j5n4q9
https://www.barracuda.com/company/legal/esg-vulnerability
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 barracuda email_security_gateway_300_firmware * From (including) 5.1.3.001 Up to (including) 9.2.0.006
运行在以下环境
系统 barracuda email_security_gateway_400_firmware * From (including) 5.1.3.001 Up to (including) 9.2.0.006
运行在以下环境
系统 barracuda email_security_gateway_600_firmware * From (including) 5.1.3.001 Up to (including) 9.2.0.006
运行在以下环境
系统 barracuda email_security_gateway_800_firmware * From (including) 5.1.3.001 Up to (including) 9.2.0.006
运行在以下环境
系统 barracuda email_security_gateway_900_firmware * From (including) 5.1.3.001 Up to (including) 9.2.0.006
运行在以下环境
系统 fedora_36 dino-devel * Up to (excluding) 0.3.2-1.fc36
运行在以下环境
系统 fedora_37 dino-devel * Up to (excluding) 0.3.2-1.fc37
运行在以下环境
系统 fedora_38 dino-devel * Up to (excluding) 0.4.2-1.fc38
运行在以下环境
硬件 barracuda email_security_gateway_300 - -
运行在以下环境
硬件 barracuda email_security_gateway_400 - -
运行在以下环境
硬件 barracuda email_security_gateway_600 - -
运行在以下环境
硬件 barracuda email_security_gateway_800 - -
运行在以下环境
硬件 barracuda email_security_gateway_900 - -
CVSS3评分 9.8
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-77 在命令中使用的特殊元素转义处理不恰当(命令注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0