Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:debian:tex-common:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24DA758F-134C-41AF-88A8-174D54DDFFAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "684FDA48-3C58-4C61-8687-43D85F32A3DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DECFC26-DC5F-464D-85AD-B7B6E01222AD", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "7FFD9092-A0D0-4E04-A4BB-01D670BD7053", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "28D6B2E6-F2D9-477C-8E99-34A8B9BD5B84", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3E71658F-3D62-45AE-A8FC-92D7FB59B0F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2EF24BC2-C24C-4798-B1A1-2FF3877EE8BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "23212A71-4FC4-46E8-96F5-B5C5B9698F31", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "961AA1EB-C2FE-495B-B319-133920818FAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "16FCDB82-15B6-4457-B728-F9039D0FF464", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "494B5D6E-678C-47B7-BA16-78A890B943B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "1B872849-4AB9-4C62-BF3F-2EA54DB05C4D", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "B7E17F2C-12DB-4954-8288-B891B8F433D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "479100B8-EC9D-49C2-AE27-3492BB0F58E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "5C886028-D08C-4013-9AF7-99DC0C4039F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "E1D78E62-CB32-4BCF-A974-FBD36B3FE8E2", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "6BF0EE5D-E5AB-44F3-BDD9-3F091937AB97", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "557D1776-C935-41B0-84D1-C0F156623396", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "177C2F57-CED3-4CDD-AC3D-1C155933B6CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B3F73CE1-362A-4B68-B348-3C0425A4A026", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "30DBAF9F-BD42-44BF-80D6-9C28B087652C", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "4DF44504-14EE-40C2-AED2-D9F8E10AA2BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "6EF93609-440B-43AF-80C2-D90362764328", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.24:*:*:*:*:*:*:*", "matchCriteriaId": "63E11A59-5DCF-472C-B966-7C4342A5B67F", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.25:*:*:*:*:*:*:*", "matchCriteriaId": "FD36254A-FF7E-4641-9B21-82BD855F58AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.26:*:*:*:*:*:*:*", "matchCriteriaId": "A9F80584-A781-4365-BE49-84F180ADFC85", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "8420E5FD-60AA-4B07-9CC1-BFE4152CF6EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "FA14BB02-445D-4CDA-A515-0B9548B8BA68", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.29:*:*:*:*:*:*:*", "matchCriteriaId": "00006DE5-ABBD-445F-AFF4-1179730B2A4B", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "AC8A45BF-CAF2-434C-87B8-16B8D1742755", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "8379E30D-BEF0-495D-B9A9-E880F7A384F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.32:*:*:*:*:*:*:*", "matchCriteriaId": "8292B5E6-28C0-42CE-A285-66EAB0CC4147", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.33:*:*:*:*:*:*:*", "matchCriteriaId": "CDC0EBA6-D762-4391-942E-56B8A9AFA927", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.34:*:*:*:*:*:*:*", "matchCriteriaId": "B3090B33-1021-4A31-B38A-2BC0A7D0AD4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.35:*:*:*:*:*:*:*", "matchCriteriaId": "AF259FE7-AD49-43E3-B7E0-B366667BCEEC", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.36:*:*:*:*:*:*:*", "matchCriteriaId": "437C67B9-F4D6-4A9D-A70A-3A428347AB3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.37:*:*:*:*:*:*:*", "matchCriteriaId": "AE2E7C84-11E7-4F5D-AD72-4A8C01AF7025", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.38:*:*:*:*:*:*:*", "matchCriteriaId": "1C0724A3-D6FF-49BD-8F93-D101830D7816", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.39:*:*:*:*:*:*:*", "matchCriteriaId": "F10D00E9-2E45-4987-B0C6-4F9BD3FDB86B", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "A35D39E1-B1EC-4CEF-B7AA-DDA8A9BACD83", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "F2F9D5C9-29F4-4A15-ACA5-F32EA9DA378B", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "1FE81D1B-00C4-45B2-90DB-7C7A10756BCB", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "23C9BBB7-ED1C-4721-8BD4-A36CE718128A", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:0.44:*:*:*:*:*:*:*", "matchCriteriaId": "5216A9CD-3BC1-4F67-93A5-925D5C70D2A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8357A055-0E67-48F7-819D-602661EA421B", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1069F78-BF9D-4526-BC26-3AA0233F6549", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "508437A7-D209-4877-989C-559F145341C1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "692F9BFE-468B-4FD5-A52E-8B509D010641", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4E6EB59D-3A7B-4177-B06E-158119613909", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2876C2E3-F4E5-44CC-85F0-E1B3F4222F11", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A13212C-467A-4CED-8B93-ED84C3802B50", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3E600687-9A1A-41BC-B104-6EB14871ACC6", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC680EA6-E85B-463C-827B-B4DF181720DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B28E6F41-729F-40BE-BDF2-DBBDBD03EBDB", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A2760FBF-1F50-4234-B80A-7513882AA1D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "680EDB3A-6746-4EFE-AB0C-88195A8857A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "A80D0F7A-BA30-4A53-B148-5B98BFFF3AB5", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B504A1CC-DD5C-44C0-8C4D-0BA3AAD276F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "54D06E59-63C8-42AE-A6A8-4EE55BFA61FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "3ECA91F5-25DA-4280-8E81-73CE09078419", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "81F13A05-DF0E-4CF0-80A9-6EC85F24B845", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BC105F14-31BC-4128-BED2-84C441D576CA", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "135812BB-7E84-4E02-B92C-9F7270AD4FE3", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "A49D8754-6F42-4DD3-939A-0E8465CC4DA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "2652B150-EA4C-42EA-8E51-0FC2F3617121", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "AABA24EF-4BE2-46CC-AAB9-346B8AC94760", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4D39C981-106A-41DA-81BE-F9B5BD44CAD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A974ED2-4938-4AFE-B5EF-F018276A6734", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "F0E52DBE-639C-42B3-AD99-C49F32FC66D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "F5162EF3-5982-41DD-B489-AC6ECA644FF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "036196A0-8217-4255-9528-8D12B0607F26", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "8D39EDD1-4E6F-4D4B-8ED8-14615E79DA13", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.04:*:*:*:*:*:*:*", "matchCriteriaId": "962187C5-F4AA-41C6-B7A5-53A10A0637B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.05:*:*:*:*:*:*:*", "matchCriteriaId": "EC860AC5-DB19-4E0A-8F40-8E0957F34498", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.06:*:*:*:*:*:*:*", "matchCriteriaId": "4E5E5EC2-6CC3-4FFA-BB1E-8AE1106458CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.07:*:*:*:*:*:*:*", "matchCriteriaId": "D2CA6D20-E53C-487C-99BB-146C0F8A311D", "vulnerable": true}, {"criteria": "cpe:2.3:a:debian:tex-common:2.08:*:*:*:*:*:*:*", "matchCriteriaId": "D92CBBD2-F2E9-4C79-9ECB-C1571DF5A79D", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true}, {"criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C8919F1-CD33-437E-9627-69352B276BA3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The default configuration of the shell_escape_commands directive in conf/texmf.d/95NonPath.cnf in the tex-common package before 2.08.1 in Debian GNU/Linux squeeze, Ubuntu 10.10 and 10.04 LTS, and possibly other operating systems lists certain programs, which might allow remote attackers to execute arbitrary code via a crafted TeX document."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto de la directiva de shell_escape_commands en el archivo conf/texmf.d/95NonPath.cnf en el paquete tex-common anterior a versi\u00f3n 2.08.1 en Debian GNU/Linux squeeze, Ubuntu versiones 10.10 y 10.04 LTS, y posiblemente otros sistemas operativos, enumera ciertos programas, que podr\u00edan permitir a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un documento TeX especialmente dise\u00f1ado."}], "id": "CVE-2011-1400", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-03-25T19:55:01.607", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43816"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43973"}, {"source": "cve@mitre.org", "url": "http://svn.debian.org/wsvn/debian-tex/?op=comp&compare%5B%5D=%2Ftex-common%2Ftrunk%404781&compare%5B%5D=%2Ftex-common%2Ftrunk%404812"}, {"source": "cve@mitre.org", "url": "http://svn.debian.org/wsvn/debian-tex/tex-common/trunk/?op=log"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2198"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46986"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1103-1"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0731"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0861"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66249"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43816"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43973"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.debian.org/wsvn/debian-tex/?op=comp&compare%5B%5D=%2Ftex-common%2Ftrunk%404781&compare%5B%5D=%2Ftex-common%2Ftrunk%404812"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.debian.org/wsvn/debian-tex/tex-common/trunk/?op=log"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2198"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46986"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1103-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0731"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0861"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66249"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-16"}], "source": "nvd@nist.gov", "type": "Primary"}]}