CVE-2017-14176

Published: Nov 27, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-5686 Aliases: GSD-2017-14176
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 9,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0160
Percentile
0,8th
Updated

EPSS Score Trend (Last 91 Days)

Application

Bazaar by Canonical

Version Range Affected
To 2.7.0 (inclusive)
cpe:2.3:a:canonical:bazaar:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14176.html
https://bugs.debian.org/874429
Issue Tracking Third Party Advisory
https://bugs.debian.org/874429
https://bugs.launchpad.net/bzr/+bug/1710979
Issue Tracking Third Party Advisory
https://bugs.launchpad.net/bzr/+bug/1710979
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
https://bugzilla.suse.com/show_bug.cgi?id=1058214
Issue Tracking Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1058214
https://www.debian.org/security/2017/dsa-4052
Issue Tracking Third Party Advisory
https://www.debian.org/security/2017/dsa-4052
http://www.ubuntu.com/usn/usn-3411-1
Issue Tracking Vendor Advisory
http://www.ubuntu.com/usn/usn-3411-1
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14176.html
https://bugs.debian.org/874429
Issue Tracking Third Party Advisory
https://bugs.debian.org/874429
https://bugs.launchpad.net/bzr/+bug/1710979
Issue Tracking Third Party Advisory
https://bugs.launchpad.net/bzr/+bug/1710979
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1486685
https://bugzilla.suse.com/show_bug.cgi?id=1058214
Issue Tracking Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1058214
https://www.debian.org/security/2017/dsa-4052
Issue Tracking Third Party Advisory
https://www.debian.org/security/2017/dsa-4052
http://www.ubuntu.com/usn/usn-3411-1
Issue Tracking Vendor Advisory
http://www.ubuntu.com/usn/usn-3411-1