First published: Wed Jan 13 2010(Updated: )
Yaws 1.85 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yaws | =1.85 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4495 has a high severity rating due to its potential to allow remote attackers to execute arbitrary commands.
CVE-2009-4495 affects Yaws 1.85 by allowing it to log non-printable characters without sanitization, leading to possible command execution.
To fix CVE-2009-4495, update Yaws to a version that properly sanitizes log entries to prevent special character exploitation.
Yes, CVE-2009-4495 can be exploited over the network through specially crafted HTTP requests.
Exploiting CVE-2009-4495 can lead to unauthorized command execution and the alteration of window titles.