![]() MITRE ATT&CK project uses the attack technique T1202 for this issue. The price for an exploit might be around USD $0-$5k at the moment ( estimation calculated on ). Technical details are known, but no exploit is available. The exploitation doesn't need any form of authentication. This vulnerability is known as CVE-2008-5718 since. The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title. As an impact it is known to affect confidentiality, integrity, and availability. The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. The CWE definition for the vulnerability is CWE-78. ![]() ![]() The manipulation with an unknown input leads to a os command injection vulnerability. Affected by this vulnerability is the function popen. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability classified as very critical was found in Netatalk. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |