First published: Tue Oct 21 2008(Updated: )
The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to delete arbitrary files via vectors involving a modified input filename in which (1) a final "z" character is replaced by a "t" character or (2) a final "t" character is replaced by a "z" character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead | <=2.82 | |
Jhead | =1.2 | |
Jhead | =1.3 | |
Jhead | =1.4 | |
Jhead | =1.5 | |
Jhead | =1.6 | |
Jhead | =1.7 | |
Jhead | =1.8 | |
Jhead | =1.9 | |
Jhead | =2.0 | |
Jhead | =2.1 | |
Jhead | =2.2 | |
Jhead | =2.3 | |
Jhead | =2.4 | |
Jhead | =2.4-1 | |
Jhead | =2.4-2 | |
Jhead | =2.5 | |
Jhead | =2.6 | |
Jhead | =2.7 | |
Jhead | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4640 is classified as a moderate severity vulnerability due to its potential for local users to delete arbitrary files.
To fix CVE-2008-4640, update jhead to version 2.85 or later, which addresses this vulnerability.
CVE-2008-4640 affects jhead versions 2.84 and earlier, as well as all versions up to 1.9 inclusive.
The implications of CVE-2008-4640 include the ability for an attacker with local access to delete files, potentially leading to data loss.
Yes, exploitation of CVE-2008-4640 requires local access and involves manipulating the input filename to delete files.