跳转到帖子

Amazon Linux 2023: CVE-2024-32487: Important priority package update for less

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2024-32487: Important priority package update for less

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
04/13/2024
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases. An OS command injection flaw was found in Less. Since quoting is mishandled in filename.c, opening files with attacker-controlled file names can lead to OS command execution. Exploitation requires the LESSOPEN environment variable, which is set by default in many common cases.

Solution(s)

  • amazon-linux-2023-upgrade-less
  • amazon-linux-2023-upgrade-less-debuginfo
  • amazon-linux-2023-upgrade-less-debugsource

References

  • https://attackerkb.com/topics/cve-2024-32487
  • CVE - 2024-32487
  • https://alas.aws.amazon.com/AL2023/ALAS-2024-622.html
  • 查看数 708
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…