CVE-2018-1000532

NameCVE-2018-1000532
Descriptionbeep version 1.3 and up contains a External Control of File Name or Path vulnerability in --device option that can result in Local unprivileged user can inhibit execution of arbitrary programs by other users, allowing DoS. This attack appear to be exploitable via The system must allow local users to run beep.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)
Debian Bugs902722

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
beep (PTS)jessie (security), jessie1.3-3+deb8u1vulnerable
stretch (security), stretch1.3-4+deb9u1vulnerable
buster, sid1.3-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
beepsource(unstable)(unfixed)low902722

Notes

[stretch] - beep <no-dsa> (Minor issue)
[jessie] - beep <no-dsa> (Minor issue)
https://github.com/johnath/beep/issues/11#issuecomment-379514298

Search for package or bug name: Reporting problems