CVE-2017-1000117

Priority
Description
A malicious third-party can give a crafted "ssh://..." URL to an
unsuspecting victim, and an attempt to visit the URL can result in any
program that exists on the victim's machine being executed. Such a URL
could be placed in the .gitmodules file of a malicious project, and an
unsuspecting victim could be tricked into running "git clone
--recurse-submodules" to trigger the vulnerability.
Ubuntu-Description
Brian Neel, Joern Schneeweisz, and Jeff King discovered that Git did
not properly handle host names in 'ssh://' URLs. A remote attacker
could use this to construct a git repository that when accessed
could run arbitrary code with the privileges of the user.
Notes
Package
Source: git (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 16.04 ESM:released (1:2.7.4-0ubuntu1.2)
Ubuntu 14.04 ESM:DNE (trusty was released [1:1.9.1-1ubuntu0.6])
Patches:
More Information

Updated: 2022-04-13 12:51:26 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)