Bug 1759 - /usr/bin/play is a shell script which can be exploited via mime types
Summary: /usr/bin/play is a shell script which can be exploited via mime types
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: sox   
(Show other bugs)
Version: 6.0
Hardware: i386 Linux
high
medium
Target Milestone: ---
Assignee: Mike Maher
QA Contact:
URL:
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 1999-03-24 21:46 UTC by Preston Brown
Modified: 2008-05-01 15:37 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 1999-04-01 22:37:09 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Preston Brown 1999-03-24 21:46:38 UTC
/usr/bin/play doesn't properly quote its arguments, and when
fed a properly crafted 'audio file', could do some nasty
things to your system as the user it is being run as.

Comment 1 Cristian Gafton 1999-03-24 22:18:59 UTC
assigned to mike

Comment 2 Mike Maher 1999-04-01 22:37:59 UTC
This problem is fixed and in the tree.


Note You need to log in before you can comment on or make changes to this bug.