CVE-2005-1307

The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adobe:version_cue:gold:*:mac_os_x:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2004-12/0040.html - () http://archives.neohapsis.com/archives/bugtraq/2004-12/0040.html -
References () http://marc.info/?l=bugtraq&m=111627622403544&w=2 - () http://marc.info/?l=bugtraq&m=111627622403544&w=2 -
References () http://secunia.com/advisories/13399 - () http://secunia.com/advisories/13399 -
References () http://securitytracker.com/id?1012446 - () http://securitytracker.com/id?1012446 -
References () http://www.adobe.com/support/techdocs/331621.html - () http://www.adobe.com/support/techdocs/331621.html -
References () http://www.osvdb.org/12297 - () http://www.osvdb.org/12297 -
References () http://www.osvdb.org/12298 - () http://www.osvdb.org/12298 -
References () http://www.securiteam.com/exploits/5EP0D20FQC.html - Exploit () http://www.securiteam.com/exploits/5EP0D20FQC.html - Exploit
References () http://www.securityfocus.com/bid/11833 - () http://www.securityfocus.com/bid/11833 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18445 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18445 -

Information

Published : 2005-05-17 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1307

Mitre link : CVE-2005-1307

CVE.ORG link : CVE-2005-1307


JSON object : View

Products Affected

apple

  • mac_os_x

adobe

  • version_cue