CVE-2006-1865

Argument injection vulnerability in Beagle before 0.2.5 allows attackers to execute arbitrary commands via crafted filenames that inject command line arguments when Beagle launches external helper applications while indexing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:beagle_project:beagle:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://lists.seifried.org/pipermail/security/2006-April/013163.html - Broken Link () http://lists.seifried.org/pipermail/security/2006-April/013163.html - Broken Link
References () http://scary.beasts.org/security/CESA-2006-002.html - Third Party Advisory () http://scary.beasts.org/security/CESA-2006-002.html - Third Party Advisory
References () http://secunia.com/advisories/19778 - Broken Link, Vendor Advisory () http://secunia.com/advisories/19778 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/19781 - Broken Link, Vendor Advisory () http://secunia.com/advisories/19781 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/19897 - Broken Link, Vendor Advisory () http://secunia.com/advisories/19897 - Broken Link, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_04_28.html - Broken Link () http://www.novell.com/linux/security/advisories/2006_04_28.html - Broken Link
References () http://www.osvdb.org/24938 - Broken Link () http://www.osvdb.org/24938 - Broken Link
References () http://www.securityfocus.com/bid/17611 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/17611 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189282 - Issue Tracking () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189282 - Issue Tracking
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26104 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/26104 - Third Party Advisory, VDB Entry

13 Feb 2024, 17:54

Type Values Removed Values Added
First Time Beagle Project beagle
Beagle Project
CPE cpe:2.3:a:beagle-project:beagle:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:beagle_project:beagle:*:*:*:*:*:*:*:*
CWE CWE-94 CWE-88
References (OSVDB) http://www.osvdb.org/24938 - (OSVDB) http://www.osvdb.org/24938 - Broken Link
References (FEDORA) http://lists.seifried.org/pipermail/security/2006-April/013163.html - (FEDORA) http://lists.seifried.org/pipermail/security/2006-April/013163.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/19778 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/19778 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/19781 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/19781 - Broken Link, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/26104 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/26104 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/19897 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/19897 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/17611 - (BID) http://www.securityfocus.com/bid/17611 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189282 - (CONFIRM) https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189282 - Issue Tracking
References (SUSE) http://www.novell.com/linux/security/advisories/2006_04_28.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_04_28.html - Broken Link
References (MISC) http://scary.beasts.org/security/CESA-2006-002.html - (MISC) http://scary.beasts.org/security/CESA-2006-002.html - Third Party Advisory

Information

Published : 2006-04-21 23:06

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1865

Mitre link : CVE-2006-1865

CVE.ORG link : CVE-2006-1865


JSON object : View

Products Affected

beagle_project

  • beagle
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')