Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://securitytracker.com/id?1017233 | vdb-entry x_refsource_SECTRACK x_transferred |
http://secunia.com/advisories/22920 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.redhat.com/support/errata/RHSA-2006-0742.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/22923 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://security.gentoo.org/glsa/glsa-200612-16.xml | vendor-advisory x_refsource_GENTOO x_transferred |
http://secunia.com/advisories/22905 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.trustix.org/errata/2007/0005 | vendor-advisory x_refsource_TRUSTIX x_transferred |
http://www.securityfocus.com/archive/1/451870/100/200/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/23467 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/24005 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11213 | vdb-entry signature x_refsource_OVAL x_transferred |
http://secunia.com/advisories/23188 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2006/dsa-1240 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/23234 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2006/dsa-1228 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://securitytracker.com/id?1017232 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.novell.com/linux/security/advisories/2006_27_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30299 | vdb-entry x_refsource_XF x_transferred |
http://secunia.com/advisories/24054 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/23132 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/21082 | vdb-entry x_refsource_BID x_transferred |
http://marc.info/?l=full-disclosure&m=116355556512780&w=2 | mailing-list x_refsource_FULLDISC x_transferred |
https://www.debian.org/security/2006/dsa-1226 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:216 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://secunia.com/advisories/23389 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/23022 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml | vendor-advisory x_refsource_GENTOO x_transferred |
http://bugzilla.elinks.cz/show_bug.cgi?id=841 | x_refsource_CONFIRM x_transferred |
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |