UBUNTU-CVE-2016-2056

Source
https://ubuntu.com/security/CVE-2016-2056
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2056.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-2056
Related
Published
2016-04-13T16:59:00Z
Modified
2025-01-13T10:21:12Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.

References

Affected packages

Ubuntu:16.04:LTS / xymon

Package

Name
xymon
Purl
pkg:deb/ubuntu/xymon@4.3.25-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.25-1

Affected versions

4.*

4.3.21-1
4.3.21-2
4.3.22~beta-1
4.3.24-1
4.3.24-2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client-dbgsym"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-dbgsym"
        }
    ]
}