CVE-2011-1400 : Detail

CVE-2011-1400

A05-Security Misconfiguration
3.07%V4
Network
2011-03-25
18h00 +00:00
2017-08-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The default configuration of the shell_escape_commands directive in conf/texmf.d/95NonPath.cnf in the tex-common package before 2.08.1 in Debian GNU/Linux squeeze, Ubuntu 10.10 and 10.04 LTS, and possibly other operating systems lists certain programs, which might allow remote attackers to execute arbitrary code via a crafted TeX document.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-16 Category : Configuration
Weaknesses in this category are typically introduced during the configuration of the software.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Debian>>Tex-common >> Version 0.1

Debian>>Tex-common >> Version 0.2

Debian>>Tex-common >> Version 0.3

Debian>>Tex-common >> Version 0.4

Debian>>Tex-common >> Version 0.5

Debian>>Tex-common >> Version 0.6

Debian>>Tex-common >> Version 0.7

Debian>>Tex-common >> Version 0.8

Debian>>Tex-common >> Version 0.9

Debian>>Tex-common >> Version 0.10

Debian>>Tex-common >> Version 0.11

Debian>>Tex-common >> Version 0.12

Debian>>Tex-common >> Version 0.13

Debian>>Tex-common >> Version 0.14

Debian>>Tex-common >> Version 0.15

Debian>>Tex-common >> Version 0.16

Debian>>Tex-common >> Version 0.17

Debian>>Tex-common >> Version 0.18

Debian>>Tex-common >> Version 0.19

Debian>>Tex-common >> Version 0.20

Debian>>Tex-common >> Version 0.21

Debian>>Tex-common >> Version 0.22

Debian>>Tex-common >> Version 0.23

Debian>>Tex-common >> Version 0.24

Debian>>Tex-common >> Version 0.25

Debian>>Tex-common >> Version 0.26

Debian>>Tex-common >> Version 0.27

Debian>>Tex-common >> Version 0.28

Debian>>Tex-common >> Version 0.29

Debian>>Tex-common >> Version 0.30

Debian>>Tex-common >> Version 0.31

Debian>>Tex-common >> Version 0.32

Debian>>Tex-common >> Version 0.33

Debian>>Tex-common >> Version 0.34

Debian>>Tex-common >> Version 0.35

Debian>>Tex-common >> Version 0.36

Debian>>Tex-common >> Version 0.37

Debian>>Tex-common >> Version 0.38

Debian>>Tex-common >> Version 0.39

Debian>>Tex-common >> Version 0.40

Debian>>Tex-common >> Version 0.41

Debian>>Tex-common >> Version 0.42

Debian>>Tex-common >> Version 0.43

Debian>>Tex-common >> Version 0.44

Debian>>Tex-common >> Version 1.0

Debian>>Tex-common >> Version 1.1

Debian>>Tex-common >> Version 1.2

Debian>>Tex-common >> Version 1.3

Debian>>Tex-common >> Version 1.4

Debian>>Tex-common >> Version 1.5

Debian>>Tex-common >> Version 1.6

Debian>>Tex-common >> Version 1.7

Debian>>Tex-common >> Version 1.8

Debian>>Tex-common >> Version 1.9

Debian>>Tex-common >> Version 1.10

Debian>>Tex-common >> Version 1.11

Debian>>Tex-common >> Version 1.11.1

Debian>>Tex-common >> Version 1.11.2

Debian>>Tex-common >> Version 1.11.3

Debian>>Tex-common >> Version 1.12

Debian>>Tex-common >> Version 1.13

Debian>>Tex-common >> Version 1.14

Debian>>Tex-common >> Version 1.15

Debian>>Tex-common >> Version 1.16

Debian>>Tex-common >> Version 1.17

Debian>>Tex-common >> Version 1.18

Debian>>Tex-common >> Version 1.19

Debian>>Tex-common >> Version 1.20

Debian>>Tex-common >> Version 2.00

Debian>>Tex-common >> Version 2.01

Debian>>Tex-common >> Version 2.02

Debian>>Tex-common >> Version 2.03

Debian>>Tex-common >> Version 2.04

Debian>>Tex-common >> Version 2.05

Debian>>Tex-common >> Version 2.06

Debian>>Tex-common >> Version 2.07

Debian>>Tex-common >> Version 2.08

Canonical>>Ubuntu_linux >> Version 10.04

Canonical>>Ubuntu_linux >> Version 10.10

Debian>>Debian_linux >> Version *

References

http://secunia.com/advisories/43973
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/46986
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0731
Tags : vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1103-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2011/dsa-2198
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0861
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/43816
Tags : third-party-advisory, x_refsource_SECUNIA