Kaspersky has fixed the following security problem in the TinyCheck open source tool. The tool was vulnerable to command injection due to insufficient checks of input parameters in several places. For example, an attacker could inject malicious shell code in the Wi-Fi interfaces names to force the tool to execute malicious commands. Issue type: Arbitrary Code Execution.
List of affected products
TinyCheck without commits 9fd360d and ea53de8 from December 18th
Fixed versions
TinyCheck with commits 9fd360d and ea53de8 from December 18th
To update the tool to the latest commit/version, use the following commands: #cd /usr/share/tinycheck/ && bash update.sh.
Acknowledgements
We would like to thank the security researchers from Sayfer who discovered this issue and responsibly reported it.
Kaspersky has fixed the following security problem in the TinyCheck open source tool. The tool was vulnerable to command injection due to insufficient checks of input parameters in several places. For example, an attacker could inject malicious shell code in the Wi-Fi interfaces names to force the tool to execute malicious commands. Issue type: Arbitrary Code Execution.
List of affected products
TinyCheck without commits 9fd360d and ea53de8 from December 18th
Fixed versions
TinyCheck with commits 9fd360d and ea53de8 from December 18th
To update the tool to the latest commit/version, use the following commands: #cd /usr/share/tinycheck/ && bash update.sh.
Acknowledgements
We would like to thank the security researchers from Sayfer who discovered this issue and responsibly reported it.