The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/56616 | third party advisory |
http://seclists.org/oss-sec/2014/q1/246 | mailing list exploit |
http://www.debian.org/security/2014/dsa-2946 | vendor advisory |
https://code.google.com/p/python-gnupg/issues/detail?id=98 | exploit vendor advisory |
https://code.google.com/p/python-gnupg/ | |
http://seclists.org/oss-sec/2014/q1/294 | mailing list exploit |
http://secunia.com/advisories/59031 | third party advisory |