Package: jhead
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for jhead.

CVE-2008-4641[0]:
| The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and
| earlier allows attackers to execute arbitrary commands via shell
| metacharacters in unspecified input.

CVE-2008-4640[1]:
| The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and
| earlier allows local users to delete arbitrary files via vectors
| involving a modified input filename in which (1) a final "z" character
| is replaced by a "t" character or (2) a final "t" character is
| replaced by a "z" character.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641
    http://security-tracker.debian.net/tracker/CVE-2008-4641
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640
    http://security-tracker.debian.net/tracker/CVE-2008-4640

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpbVa7GRrku2.pgp
Description: PGP signature

Reply via email to