Advisories Blog | G5 Cyber Security

Gentoo Linux Security Advisory 200911-6

Gentoo Linux Security Advisory 200911-6 – An input sanitation error in PEAR Net_Traceroute might allow remote attackers to execute arbitrary commands. Pasquale Imperato reported that the $host parameter to the traceroute() function in Traceroute.php is not properly sanitized before being passed to exec(). Versions less than 0.21.2 are affected.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83265/glsa-200911-06.txt

Source: https://packetstormsecurity.com/files/83265/Gentoo-Linux-Security-Advisory-200911-6.html

Exit mobile version