scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc - | |
References | () http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability - | |
References | () http://docs.info.apple.com/article.html?artnum=305214 - | |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112 - | |
References | () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html - | |
References | () http://secunia.com/advisories/18579 - | |
References | () http://secunia.com/advisories/18595 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18650 - | |
References | () http://secunia.com/advisories/18736 - | |
References | () http://secunia.com/advisories/18798 - | |
References | () http://secunia.com/advisories/18850 - | |
References | () http://secunia.com/advisories/18910 - | |
References | () http://secunia.com/advisories/18964 - | |
References | () http://secunia.com/advisories/18969 - | |
References | () http://secunia.com/advisories/18970 - | |
References | () http://secunia.com/advisories/19159 - | |
References | () http://secunia.com/advisories/20723 - | |
References | () http://secunia.com/advisories/21129 - | |
References | () http://secunia.com/advisories/21262 - | |
References | () http://secunia.com/advisories/21492 - | |
References | () http://secunia.com/advisories/21724 - | |
References | () http://secunia.com/advisories/22196 - | |
References | () http://secunia.com/advisories/23241 - | |
References | () http://secunia.com/advisories/23340 - | |
References | () http://secunia.com/advisories/23680 - | |
References | () http://secunia.com/advisories/24479 - | |
References | () http://secunia.com/advisories/25607 - | |
References | () http://secunia.com/advisories/25936 - | |
References | () http://securityreason.com/securityalert/462 - | |
References | () http://securitytracker.com/id?1015540 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:034 - | |
References | () http://www.novell.com/linux/security/advisories/2006_08_openssh.html - | |
References | () http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html - | |
References | () http://www.osvdb.org/22692 - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0044.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0298.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0698.html - | |
References | () http://www.securityfocus.com/archive/1/425397/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16369 - | |
References | () http://www.trustix.org/errata/2006/0004 - | |
References | () http://www.ubuntu.com/usn/usn-255-1 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource | |
References | () http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html - | |
References | () http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html - | |
References | () http://www.vupen.com/english/advisories/2006/0306 - | |
References | () http://www.vupen.com/english/advisories/2006/2490 - | |
References | () http://www.vupen.com/english/advisories/2006/4869 - | |
References | () http://www.vupen.com/english/advisories/2007/0930 - | |
References | () http://www.vupen.com/english/advisories/2007/2120 - | |
References | () http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688 - | |
References | () http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751 - | |
References | () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24305 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962 - |
Information
Published : 2006-01-25 11:03
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0225
Mitre link : CVE-2006-0225
CVE.ORG link : CVE-2006-0225
JSON object : View
Products Affected
openbsd
- openssh
CWE