CVE-2007-6610

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:debian:unp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437 -
References () http://bugs.gentoo.org/show_bug.cgi?id=203106 - () http://bugs.gentoo.org/show_bug.cgi?id=203106 -
References () http://osvdb.org/42759 - () http://osvdb.org/42759 -
References () http://secunia.com/advisories/28282 - Vendor Advisory () http://secunia.com/advisories/28282 - Vendor Advisory
References () http://secunia.com/advisories/28388 - Vendor Advisory () http://secunia.com/advisories/28388 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200801-01.xml - () http://security.gentoo.org/glsa/glsa-200801-01.xml -
References () http://www.securityfocus.com/bid/27182 - () http://www.securityfocus.com/bid/27182 -

Information

Published : 2008-01-03 20:46

Updated : 2025-04-09 00:30


NVD link : CVE-2007-6610

Mitre link : CVE-2007-6610

CVE.ORG link : CVE-2007-6610


JSON object : View

Products Affected

debian

  • unp