CVE-2017-12836

NameCVE-2017-12836
DescriptionCVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1056-1, DSA-3940-1
NVD severitymedium (attack range: remote)
Debian Bugs871810

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cvs (PTS)wheezy2:1.12.13+real-9vulnerable
wheezy (security)2:1.12.13+real-9+deb7u1fixed
jessie2:1.12.13+real-15vulnerable
jessie (security)2:1.12.13+real-15+deb8u1fixed
stretch (security), stretch2:1.12.13+real-22+deb9u1fixed
buster, sid2:1.12.13+real-24fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cvssource(unstable)2:1.12.13+real-24medium871810
cvssourcejessie2:1.12.13+real-15+deb8u1mediumDSA-3940-1
cvssourcestretch2:1.12.13+real-22+deb9u1mediumDSA-3940-1
cvssourcewheezy2:1.12.13+real-9+deb7u1mediumDLA-1056-1

Notes

http://www.openwall.com/lists/oss-security/2017/08/11/1

Search for package or bug name: Reporting problems