AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is unknown if the get_parameter vector (2) is ever called.
Link | Tags |
---|---|
http://www.vsecurity.com/bulletins/advisories/2007/afflib-shellinject.txt | |
http://www.securityfocus.com/archive/1/467041/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33964 | vdb entry |
http://securityreason.com/securityalert/2656 | third party advisory |
http://osvdb.org/35608 | vdb entry |