CVE-2006-5925

N/A Unknown
Published: November 15, 2006 Modified: April 23, 2026
View on NVD

Description

Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/22905
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22920
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22923
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23022
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23132
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23188
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23234
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23389
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23467
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24005
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24054
Source: secalert@redhat.com
Vendor Advisory
http://securitytracker.com/id?1017232
Source: secalert@redhat.com
http://securitytracker.com/id?1017233
Source: secalert@redhat.com
http://www.securityfocus.com/bid/21082
Source: secalert@redhat.com
http://www.trustix.org/errata/2007/0005
Source: secalert@redhat.com
http://bugzilla.elinks.cz/show_bug.cgi?id=841
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=full-disclosure&m=116355556512780&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22905
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22920
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22923
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23022
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23132
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23188
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23234
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23389
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23467
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24005
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24054
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200612-16.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017232
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017233
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1228
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1240
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200701-27.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:216
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_27_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0742.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451870/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/21082
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2007/0005
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30299
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2006/dsa-1226
Source: af854a3a-2127-422b-91ae-364da2661108

56 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
33.2%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

elinks links