spice-vdagent up to and including 0.17.0 does not properly escape save directory before passing to shell, allowing local attacker with access to the session the agent runs in to inject arbitrary commands to be executed.
                
            References
                    | Link | Resource | 
|---|---|
| https://cgit.freedesktop.org/spice/linux/vd_agent/commit/?id=8ba174816d245757e743e636df357910e1d5eb61 | Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html | Mailing List Third Party Advisory | 
| https://security.gentoo.org/glsa/201804-09 | Third Party Advisory | 
| https://cgit.freedesktop.org/spice/linux/vd_agent/commit/?id=8ba174816d245757e743e636df357910e1d5eb61 | Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html | Mailing List Third Party Advisory | 
| https://security.gentoo.org/glsa/201804-09 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-01-20 00:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15108
Mitre link : CVE-2017-15108
CVE.ORG link : CVE-2017-15108
JSON object : View
Products Affected
                spice-space
- spice-vdagent
debian
- debian_linux
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
