Vulnerability Description
AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is unknown if the get_parameter vector (2) is ever called.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Afflib | Afflib | <= 2.2.8 |
References
- http://osvdb.org/35608
- http://securityreason.com/securityalert/2656
- http://www.securityfocus.com/archive/1/467041/100/0/threaded
- http://www.vsecurity.com/bulletins/advisories/2007/afflib-shellinject.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33964
- http://osvdb.org/35608
- http://securityreason.com/securityalert/2656
- http://www.securityfocus.com/archive/1/467041/100/0/threaded
- http://www.vsecurity.com/bulletins/advisories/2007/afflib-shellinject.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33964
FAQ
What is CVE-2007-2055?
CVE-2007-2055 is a vulnerability with a CVSS score of 7.5 (HIGH). AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_param...
How severe is CVE-2007-2055?
CVE-2007-2055 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2055?
Check the references section above for vendor advisories and patch information. Affected products include: Afflib Afflib.