Hello, I agree, it's a good idea to add this to the references. It's been added as a "CONFIRM" reference and will be on the CVE web site later today.
Regards, Steve Christey CVE Editor ====================================================== Name: CVE-2006-5925 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925 Reference: FULLDISC:20061115 Links smbclient command execution Reference: URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=116355556512780&w=2 Reference: CONFIRM:http://bugzilla.elinks.cz/show_bug.cgi?id=841 Reference: REDHAT:RHSA-2006:0742 Reference: URL:http://www.redhat.com/support/errata/RHSA-2006-0742.html Reference: SECTRACK:1017232 Reference: URL:http://securitytracker.com/id?1017232 Reference: SECTRACK:1017233 Reference: URL:http://securitytracker.com/id?1017233 Reference: SECUNIA:22905 Reference: URL:http://secunia.com/advisories/22905 Reference: SECUNIA:22920 Reference: URL:http://secunia.com/advisories/22920 Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements. _______________________________________________ elinks-dev mailing list [email protected] http://linuxfromscratch.org/mailman/listinfo/elinks-dev
