Vulnerability Description
The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to delete arbitrary files via vectors involving a modified input filename in which (1) a final "z" character is replaced by a "t" character or (2) a final "t" character is replaced by a "z" character.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sentex | Jhead | <= 2.82 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2008/10/16/3
- http://www.openwall.com/lists/oss-security/2008/11/26/4
- http://www.securityfocus.com/bid/32506
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020
- http://www.openwall.com/lists/oss-security/2008/10/16/3
- http://www.openwall.com/lists/oss-security/2008/11/26/4
- http://www.securityfocus.com/bid/32506
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020
FAQ
What is CVE-2008-4640?
CVE-2008-4640 is a vulnerability with a CVSS score of 3.6 (LOW). The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to delete arbitrary files via vectors involving a modified input filename in which (1) a final "z" charac...
How severe is CVE-2008-4640?
CVE-2008-4640 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-4640?
Check the references section above for vendor advisories and patch information. Affected products include: Sentex Jhead.