7.5
CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2005-4533

First published: Wed Dec 28 2005(Updated: )

Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Scponly Scponly=2.1
Scponly Scponly=3.5
Scponly Scponly=4.1
Scponly Scponly=3.0
Scponly Scponly=3.11
Scponly Scponly=2.0
Scponly Scponly=3.9
Scponly Scponly=3.8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-4533?

    CVE-2005-4533 is considered a high-severity vulnerability due to the potential for local users to execute arbitrary applications.

  • How do I fix CVE-2005-4533?

    To fix CVE-2005-4533, update scponly to version 4.2 or higher, where the argument injection vulnerability has been addressed.

  • Who is affected by CVE-2005-4533?

    CVE-2005-4533 affects local users of scponly versions 2.0 through 4.1 with both SCP and RSync compatibility enabled.

  • What does CVE-2005-4533 allow an attacker to do?

    CVE-2005-4533 allows local users to manipulate command-line arguments and execute arbitrary applications.

  • Is CVE-2005-4533 applicable to all Scponly versions?

    No, CVE-2005-4533 only affects specific versions of Scponly, namely versions 2.0 to 4.1.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203