CVE-2005-4533
Published Dec 28, 2005
Last updated 7 years ago
Overview
- Description
- Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74980DC-9A5B-4959-8193-1D7BE85CAEA8" }, { "criteria": "cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0863C35F-6061-426B-B656-E7B4A02D3E95" }, { "criteria": "cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32B689CE-F02B-4315-9E74-BC360EAFB937" }, { "criteria": "cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C3262EA-F693-439B-922D-3F0DA09D0753" }, { "criteria": "cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B37D1F24-B45D-4217-972E-61BED886275A" }, { "criteria": "cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71D3E1C8-ADCB-4A5F-8078-66942E36DF6D" }, { "criteria": "cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "190FB980-F17F-43A9-8DA4-B2A99E29DF3E" }, { "criteria": "cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "298502A9-5E53-4CBE-BCCA-6D86EFDD3BF3" } ], "operator": "OR" } ] } ]