CVE-2024-29444

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

27 May 2024, 01:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/2', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/3', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/4', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/5', 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/yashpatelphd/CVE-2024-29444', 'source': 'cve@mitre.org'}
Summary
  • (es) Se ha descubierto una vulnerabilidad de inyección de comandos del sistema operativo en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar código arbitrario, escalar privilegios y obtener información confidencial a través de módulos de ejecución de comandos externos, controladores de llamadas del sistema, y scripts de interfaz.
Summary (en) An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.

01 May 2024, 19:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/5 -

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/3 -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/2 -
  • () http://www.openwall.com/lists/oss-security/2024/04/23/4 -

17 Apr 2024, 01:15

Type Values Removed Values Added
Summary (en) An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. (en) An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability.

11 Apr 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-11 00:15

Updated : 2024-05-27 01:15


NVD link : CVE-2024-29444

Mitre link : CVE-2024-29444

CVE.ORG link : CVE-2024-29444


JSON object : View

Products Affected

No product.

CWE

No CWE.