First published: Fri Dec 31 2004(Updated: )
The read_list_from_file function in vacation.pl for OpenWebmail before 2.32 20040629 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Webmail | =1.7 | |
Open Webmail | =1.8 | |
Open Webmail | =1.71 | |
Open Webmail | =1.81 | |
Open Webmail | =1.90 | |
Open Webmail | =2.20 | |
Open Webmail | =2.21 | |
Open Webmail | =2.30 | |
Open Webmail | =2.31 | |
Open Webmail | =2.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2284 has a high severity due to its potential for remote command execution.
To fix CVE-2004-2284, update OpenWebmail to version 2.32 or later.
CVE-2004-2284 affects OpenWebmail versions up to and including 2.31.
CVE-2004-2284 facilitates remote command execution via shell metacharacters in filename arguments.
CVE-2004-2284 is not a risk in OpenWebmail version 2.32 and later, as these versions have patched the vulnerability.