CERT-In Vulnerability Note
CIVN-2023-0027
Remote code execution vulnerabilities in Git
Original Issue Date:January 20, 2023
Severity Rating: CRITICAL
Software Affected
- Git versions prior to v2.30.6, v2.31.5, v2.32.4, v2.33.5, v2.34.5, v2.35.5, v2.36.3, v2.37.4, v2.38.2 & v2.39.0
Overview
Multiple vulnerabilities have been reported in Git which could allow an attacker to execute arbitrary code on the targeted system.
Description
These vulnerabilities exist in Git due to an integer overflows when processing the padding operators and parsing of git attributes. An attacker could exploit these vulnerabilities by sending a specially-crafted request.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned:
https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released/#critical-security-issues-in-git
Vendor Information
Git
https://about.gitlab.com
References
https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released/#critical-security-issues-in-git
https://github.blog/2023-01-17-git-security-vulnerabilities-announced-2/
CVE Name
CVE-2022-41903
CVE-2022-23521
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|