Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18223 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18236 - | |
References | () http://sublimation.org/scponly/#relnotes - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml - | |
References | () http://www.securityfocus.com/bid/16051 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 - |
Information
Published : 2005-12-28 01:03
Updated : 2024-11-21 00:04
NVD link : CVE-2005-4533
Mitre link : CVE-2005-4533
CVE.ORG link : CVE-2005-4533
JSON object : View
Products Affected
scponly
- scponly
CWE