7.5
CVSSv2

CVE-2002-0652

Published: 03/07/2002 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

xfsmd for IRIX 6.5 up to and including 6.5.16 allows remote malicious users to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs().

Vulnerable Product Search on Vulmon Subscribe to Product

sgi irix 6.5.14

sgi irix 6.5.15

sgi irix 6.5.7

sgi irix 6.5.8

sgi irix 6.5.11

sgi irix 6.5.12

sgi irix 6.5.13

sgi irix 6.5.5

sgi irix 6.5.6

sgi irix 6.5

sgi irix 6.5.16

sgi irix 6.5.2

sgi irix 6.5.9

sgi irix 6.5.1

sgi irix 6.5.10

sgi irix 6.5.3

sgi irix 6.5.4

Exploits

source: wwwsecurityfocuscom/bid/5075/info Throghout the implementation of the supported remote procedure calls, the server uses the popen() libc function When popen() is used, arguments passed to the RPC are included in the command string These arguments are not sanitized If shell metacharacters, such as ";" and "|" are embedded in the ...