xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/12712 | vdb entry |
http://security.gentoo.org/glsa/glsa-200503-05.xml | vendor advisory |
http://secunia.com/advisories/14459 | third party advisory patch vendor advisory |
http://bugs.gentoo.org/show_bug.cgi?id=79762 | vendor advisory |
http://www.debian.org/security/2005/dsa-695 | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-332.html | vendor advisory |
http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf | |
http://secunia.com/advisories/14462 | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10898 | vdb entry signature |
http://www.securityfocus.com/archive/1/433935/30/5010/threaded | vendor advisory |
http://www.osvdb.org/14365 | vdb entry |