9 lines
No EOL
421 B
Text
9 lines
No EOL
421 B
Text
source: https://www.securityfocus.com/bid/47924/info
|
|
|
|
klibc is prone to a shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this issue to execute arbitrary shell commands in the context of the application that uses the vulnerable library.
|
|
|
|
Versions prior to klibc 1.5.22 are vulnerable.
|
|
|
|
DNSDOMAIN="\\\"\$(echo owned; touch /tmp/owned)" |