unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.
Link | Tags |
---|---|
http://secunia.com/advisories/28388 | third party advisory vendor advisory |
http://bugs.gentoo.org/show_bug.cgi?id=203106 | |
http://secunia.com/advisories/28282 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/27182 | vdb entry |
http://security.gentoo.org/glsa/glsa-200801-01.xml | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437 | |
http://osvdb.org/42759 | vdb entry |