First published: Wed Nov 15 2006(Updated: )
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elinks | 0.13~20190125-3 0.13.2-1 0.16.1.1-4 | |
debian/links2 | 2.18-2 2.21-1 2.28-1 2.29-1 | |
WP Links Page | =0.9.2 | |
Linksnet Newsfeed | =1.00pre12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5925 has been categorized as a high-severity vulnerability due to its potential to allow remote code execution.
To remediate CVE-2006-5925, users should upgrade to the latest patched versions of affected software like elinks or links2.
CVE-2006-5925 specifically affects Links version 1.00pre12.
Elinks version 0.9.2 is known to be vulnerable to CVE-2006-5925.
Yes, CVE-2006-5925 can be exploited via malicious smb:// URIs utilizing shell metacharacters.