CVE-2008-2575

cbrPager before 0.9.17 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename.
References
Link Resource
http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 Broken Link Exploit
http://secunia.com/advisories/30417 Broken Link Vendor Advisory
http://secunia.com/advisories/30438 Broken Link Vendor Advisory
http://secunia.com/advisories/30701 Broken Link
http://security.gentoo.org/glsa/glsa-200806-05.xml Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=827120 Broken Link Patch
http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 Patch
http://www.jcoppens.com/soft/cbrpager/log.en.php Release Notes
http://www.vupen.com/english/advisories/2008/1693/references Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=448285 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 Third Party Advisory VDB Entry
http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 Broken Link Exploit
http://secunia.com/advisories/30417 Broken Link Vendor Advisory
http://secunia.com/advisories/30438 Broken Link Vendor Advisory
http://secunia.com/advisories/30701 Broken Link
http://security.gentoo.org/glsa/glsa-200806-05.xml Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=827120 Broken Link Patch
http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 Patch
http://www.jcoppens.com/soft/cbrpager/log.en.php Release Notes
http://www.vupen.com/english/advisories/2008/1693/references Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=448285 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:jcoppens:cbrpager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:47

Type Values Removed Values Added
References () http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Broken Link, Exploit () http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Broken Link, Exploit
References () http://secunia.com/advisories/30417 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30417 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30438 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30438 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30701 - Broken Link () http://secunia.com/advisories/30701 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200806-05.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200806-05.xml - Third Party Advisory
References () http://sourceforge.net/forum/forum.php?forum_id=827120 - Broken Link, Patch () http://sourceforge.net/forum/forum.php?forum_id=827120 - Broken Link, Patch
References () http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 - Patch () http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 - Patch
References () http://www.jcoppens.com/soft/cbrpager/log.en.php - Release Notes () http://www.jcoppens.com/soft/cbrpager/log.en.php - Release Notes
References () http://www.vupen.com/english/advisories/2008/1693/references - Broken Link () http://www.vupen.com/english/advisories/2008/1693/references - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=448285 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=448285 - Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - Third Party Advisory, VDB Entry

02 Feb 2024, 15:13

Type Values Removed Values Added
References (VUPEN) http://www.vupen.com/english/advisories/2008/1693/references - (VUPEN) http://www.vupen.com/english/advisories/2008/1693/references - Broken Link
References (SECUNIA) http://secunia.com/advisories/30417 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30417 - Broken Link, Vendor Advisory
References (CONFIRM) http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Exploit (CONFIRM) http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Broken Link, Exploit
References (SECUNIA) http://secunia.com/advisories/30438 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30438 - Broken Link, Vendor Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=448285 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=448285 - Issue Tracking, Third Party Advisory
References (CONFIRM) http://www.jcoppens.com/soft/cbrpager/log.en.php - (CONFIRM) http://www.jcoppens.com/soft/cbrpager/log.en.php - Release Notes
References (CONFIRM) http://sourceforge.net/forum/forum.php?forum_id=827120 - Patch (CONFIRM) http://sourceforge.net/forum/forum.php?forum_id=827120 - Broken Link, Patch
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/30701 - (SECUNIA) http://secunia.com/advisories/30701 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200806-05.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200806-05.xml - Third Party Advisory
CWE CWE-94 CWE-78
CPE cpe:2.3:a:jcoppens:cbrpager:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:0.9.14:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:a:jcoppens:cbrpager:*:*:*:*:*:*:*:*
First Time Fedoraproject
Fedoraproject fedora

Information

Published : 2008-06-06 22:32

Updated : 2024-11-21 00:47


NVD link : CVE-2008-2575

Mitre link : CVE-2008-2575

CVE.ORG link : CVE-2008-2575


JSON object : View

Products Affected

jcoppens

  • cbrpager

fedoraproject

  • fedora
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')