Vulnerability Details : CVE-2004-1175
fish.c in midnight commander allows remote attackers to execute arbitrary programs via "insecure filename quoting," possibly using shell metacharacters.
Products affected by CVE-2004-1175
- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.54:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1175
0.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1175
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-1175
-
http://www.debian.org/security/2005/dsa-639
[SECURITY] [DSA 639-1] New mc packages fix several vulnerabilitiesPatch;Vendor Advisory
-
http://secunia.com/advisories/13863/
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-512.html
Support
-
http://securitytracker.com/id?1012903
GoDaddy Domain Name Search
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/18906
Midnight Commander command execution CVE-2004-1175 Vulnerability Report
Jump to