CVE-2007-6610

critical

Description

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

References

http://www.securityfocus.com/bid/27182

http://security.gentoo.org/glsa/glsa-200801-01.xml

http://secunia.com/advisories/28388

http://secunia.com/advisories/28282

http://osvdb.org/42759

http://bugs.gentoo.org/show_bug.cgi?id=203106

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437

Details

Source: Mitre, NVD

Published: 2008-01-03

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical