CVE-2012-5534

NameCVE-2012-5534
DescriptionThe hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2598-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
weechat (PTS)wheezy0.3.8-1+deb7u1fixed
jessie1.0.1-1fixed
stretch, sid1.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
weechatsource(unstable)0.3.9.2-1high
weechatsourcesqueeze0.3.2-1+squeeze1highDSA-2598-1
weechatsourcewheezy0.3.8-1+deb7u1high

Search for package or bug name: Reporting problems