Bug 253165 - (CVE-2007-4044) CVE-2007-4044 'c' character missing from shell metacharacter whitelist
CVE-2007-4044 'c' character missing from shell metacharacter whitelist
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
http://nvd.nist.gov/nvd.cfm?cvename=C...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-08-17 05:06 EDT by Lubomir Kundrak
Modified: 2007-08-17 09:10 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-17 05:12:34 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Lubomir Kundrak 2007-08-17 05:06:04 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-4044
to the following vulnerability:

Incomplete blacklist vulnerability in the MS-RPC functionality in smbd in Samba 3 on SUSE Linux before 20070720 allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors, due to an incomplete fix for CVE-2007-2447 that 
"
missed one character in the shell escape handling.
"

References:

http://www.novell.com/linux/security/advisories/2007_14_sr.html
Comment 2 Lubomir Kundrak 2007-08-17 05:12:34 EDT
The CVE description is wrong. This does not have any security implications, it
only causes 'c' characters passed to shell to be escaped.
Comment 4 Simo Sorce 2007-08-17 08:54:42 EDT
This is NOT a security problem (and not even a "bug"), we have already
identified this problem months ago and verified it is only a cosmetic problem.
We were not able to find out any way to misuse or any secondary effect of
escaping the "c" character as the shell will happily expand it before running
the commands.

Note You need to log in before you can comment on or make changes to this bug.