From 8a688c06981b72de038208aa409590fb4cf6f7f2 Mon Sep 17 00:00:00 2001 From: simon Date: Sun, 23 Jan 2005 23:52:33 +0000 Subject: Document a vulnerability in YAMT. --- security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0365c59290a1..a97af23302aa 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,36 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + yamt -- arbitrary command execution vulnerability + + + yamt + 0 + + + + +

Manigandan Radhakrishnan discovered a security + vulnerability in YAMT which can lead to execution of + arbitrary commands with the privileges of the user running + YAMT when sorting based on MP3 tags. The problem exist in + the id3tag_sort() routine which does not + properly sanitize the artist tag from the MP3 file before + using it as an argument to the mv command.

+ +
+ + 11999 + CAN-2004-1302 + http://tigger.uic.edu/~jlongs2/holes/yamt.txt + + + 2004-12-15 + 2005-01-23 + +
+ squid -- HTTP response splitting cache pollution attack -- cgit