Vulnerabilities > CVE-2019-17080 - Deserialization of Untrusted Data vulnerability in Linuxmint Mintinstall 7.9.9
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
id | EDB-ID:47457 |
last seen | 2019-10-03 |
modified | 2019-10-03 |
published | 2019-10-03 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/47457 |
title | mintinstall 7.9.9 - Code Execution |
Packetstorm
data source | https://packetstormsecurity.com/files/download/154722/mintinstall799-exec.txt |
id | PACKETSTORM:154722 |
last seen | 2019-10-03 |
published | 2019-10-02 |
reporter | Andhrimnirr |
source | https://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html |
title | mintinstall 7.9.9 Code Execution |
References
- http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html
- http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html
- https://forums.linuxmint.com/viewtopic.php?f=143&t=302960
- https://forums.linuxmint.com/viewtopic.php?f=143&t=302960
- https://github.com/Andhrimnirr/Mintinstall-object-injection
- https://github.com/Andhrimnirr/Mintinstall-object-injection
- https://github.com/linuxmint/mintinstall/blob/master/debian/changelog
- https://github.com/linuxmint/mintinstall/blob/master/debian/changelog