CVE-2012-5534

NameCVE-2012-5534
DescriptionThe hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2598-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
weechat (PTS)jessie, jessie (lts)1.0.1-1+deb8u4fixed
stretch (security), stretch (lts), stretch1.6-1+deb9u3fixed
buster2.3-1+deb10u1fixed
bullseye3.0-1+deb11u1fixed
bookworm3.8-1fixed
sid, trixie4.4.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
weechatsourcesqueeze0.3.2-1+squeeze1DSA-2598-1
weechatsourcewheezy0.3.8-1+deb7u1
weechatsource(unstable)0.3.9.2-1

Search for package or bug name: Reporting problems