Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5718

Опубликовано: 26 дек. 2008
Источник: debian
EPSS Низкий

Описание

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
netatalkfixed2.0.4~beta2-1package

EPSS

Процентиль: 82%
0.01824
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

nvd
почти 17 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

github
больше 3 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

EPSS

Процентиль: 82%
0.01824
Низкий