AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is unknown if the get_parameter vector (2) is ever called.
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/35608 - | |
References | () http://securityreason.com/securityalert/2656 - | |
References | () http://www.securityfocus.com/archive/1/467041/100/0/threaded - | |
References | () http://www.vsecurity.com/bulletins/advisories/2007/afflib-shellinject.txt - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33964 - |
Information
Published : 2007-04-30 22:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2055
Mitre link : CVE-2007-2055
CVE.ORG link : CVE-2007-2055
JSON object : View
Products Affected
afflib
- afflib
CWE