procmail in Ingo H3 before 1.1.2 Horde module allows remote authenticated users to execute arbitrary commands via shell metacharacters in the mailbox destination of a filter rule.
References
Configurations
History
21 Nov 2024, 00:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.horde.org/ticket/?Horde=6ed1a009f3396864553976a45948339e&id=4513 - Patch | |
References | () http://lists.horde.org/archives/announce/2006/000296.html - Patch | |
References | () http://secunia.com/advisories/22482 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22656 - | |
References | () http://secunia.com/advisories/23100 - | |
References | () http://www.debian.org/security/2006/dsa-1204 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200611-22.xml - | |
References | () http://www.securityfocus.com/bid/20637 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/4124 - |
Information
Published : 2006-10-23 17:07
Updated : 2024-11-21 00:19
NVD link : CVE-2006-5449
Mitre link : CVE-2006-5449
CVE.ORG link : CVE-2006-5449
JSON object : View
Products Affected
horde
- ingo_h3
CWE