Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device.
Link | Tags |
---|---|
http://www.sambar.com/security.htm | vendor advisory |
http://secunia.com/advisories/9578 | third party advisory vendor advisory |
http://www.osvdb.org/5781 | vdb entry patch |
http://securitytracker.com/id?1007819 | vdb entry patch |
http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true | third party advisory vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html | mailing list vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16059 | vdb entry |