VYPR
Unrated severityNVD Advisory· Published Oct 1, 2012· Updated Apr 29, 2026

CVE-2012-2242

CVE-2012-2242

Description

scripts/dget.pl in devscripts before 2.10.73 allows remote attackers to execute arbitrary commands via a crafted (1) .dsc or (2) .changes file, related to "arguments to external commands" that are not properly escaped, a different vulnerability than CVE-2012-2240.

Affected products

74
  • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*+ 73 more
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*range: <=2.10.72
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze2:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze3:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze4:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.70:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.71:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:*:*:*:*:*:*:*
    • cpe:2.3:a:devscripts_devel_team:devscripts:2.10.69:squeeze1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.