mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
References
Link | Resource |
---|---|
https://github.com/linuxmint/mintinstall/blob/master/debian/changelog | Release Notes Third Party Advisory |
https://github.com/Andhrimnirr/Mintinstall-object-injection | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://forums.linuxmint.com/viewtopic.php?f=143&t=302960 | Exploit Vendor Advisory |
Configurations
Information
Published : 2019-10-02 06:15
Updated : 2019-10-08 11:23
NVD link : CVE-2019-17080
Mitre link : CVE-2019-17080
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
linuxmint
- mintinstall