The cTrigger::DoIt function in src/ctrigger.cpp in the trigger mechanism in the daemon in Verlihub 0.9.8d-RC2 and earlier, when user triggers are enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in an argument.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/32420 | vdb entry |
http://bugs.debian.org/506530 | |
https://www.exploit-db.com/exploits/7183 | exploit |
http://openwall.com/lists/oss-security/2008/12/17/16 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46801 | vdb entry |
http://securityreason.com/securityalert/4800 | third party advisory |