CVE-2005-4533

Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://secunia.com/advisories/18223 - Patch, Vendor Advisory () http://secunia.com/advisories/18223 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18236 - () http://secunia.com/advisories/18236 -
References () http://sublimation.org/scponly/#relnotes - () http://sublimation.org/scponly/#relnotes -
References () http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml - () http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml -
References () http://www.securityfocus.com/bid/16051 - () http://www.securityfocus.com/bid/16051 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 -

Information

Published : 2005-12-28 01:03

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4533

Mitre link : CVE-2005-4533

CVE.ORG link : CVE-2005-4533


JSON object : View

Products Affected

scponly

  • scponly