CVE-2014-1928

EUVD-2014-0089
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
Affected Products (NVD)
VendorProductVersion
python-gnupg_projectpython-gnupg
𝑥
≤ 0.3.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-gnupg
bookworm
0.4.9-1
fixed
bullseye
0.4.6-1
fixed
sid
0.5.2-2
fixed
trixie
0.5.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-gnupg
lucid
dne
precise
dne
quantal
ignored
saucy
ignored
trusty
not-affected
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
not-affected