Vulnerability Description
bugzilla_email_append.pl in Bugzilla 2.14.x before 2.14.4, and 2.16.x before 2.16.1, allows remote attackers to execute arbitrary code via shell metacharacters in a system call to processmail.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Bugzilla | 2.14 |
References
- http://bugzilla.mozilla.org/show_bug.cgi?id=163024
- http://marc.info/?l=bugtraq&m=103349804226566&w=2
- http://www.iss.net/security_center/static/10234.phpVendor Advisory
- http://www.securityfocus.com/bid/5844
- http://bugzilla.mozilla.org/show_bug.cgi?id=163024
- http://marc.info/?l=bugtraq&m=103349804226566&w=2
- http://www.iss.net/security_center/static/10234.phpVendor Advisory
- http://www.securityfocus.com/bid/5844
FAQ
What is CVE-2002-1197?
CVE-2002-1197 is a vulnerability with a CVSS score of 7.5 (HIGH). bugzilla_email_append.pl in Bugzilla 2.14.x before 2.14.4, and 2.16.x before 2.16.1, allows remote attackers to execute arbitrary code via shell metacharacters in a system call to processmail.
How severe is CVE-2002-1197?
CVE-2002-1197 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1197?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Bugzilla.