CVE-2024-32487 Affecting less package, versions <458-2ubuntu0.1~esm1


medium

Snyk CVSS

      Threat Intelligence

      EPSS 0.05% (15th percentile)
    Expand this section
    Red Hat
    8.6 high
    Expand this section
    SUSE
    8.6 high

    Do your applications use this vulnerable package?

    In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

    Test your applications
    • Snyk ID SNYK-UBUNTU1404-LESS-6672174
    • published 29 Apr 2024
    • disclosed 13 Apr 2024

    How to fix?

    Upgrade Ubuntu:14.04 less to version 458-2ubuntu0.1~esm1 or higher.

    NVD Description

    Note: Versions mentioned in the description apply only to the upstream less package and not the less package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

    less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.