Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-4488

Опубликовано: 13 янв. 2010
Источник: ubuntu
Приоритет: negligible
CVSS2: 5
CVSS3: 9.8

Описание

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.

РелизСтатусПримечание
dapper

DNE

devel

ignored

esm-apps/xenial

ignored

esm-infra-legacy/trusty

ignored

hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life

Показывать по

Ссылки на источники

5 Medium

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 16 лет назад

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.

CVSS3: 9.8
debian
почти 16 лет назад

Varnish 2.0.6 writes data to a log file without sanitizing non-printab ...

CVSS3: 9.8
github
больше 3 лет назад

** DISPUTED ** Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely."

5 Medium

CVSS2

9.8 Critical

CVSS3