{"id":"CVE-2006-0225","details":"scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.","modified":"2026-01-27T04:06:26.684227Z","published":"2006-01-25T11:03:00Z","withdrawn":"2026-01-27T04:06:26.684227Z","related":["openSUSE-SU-2024:11124-1"],"references":[{"type":"ADVISORY","url":"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18579"},{"type":"FIX","url":"http://secunia.com/advisories/18595"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18650"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18736"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18798"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18850"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18910"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18964"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18969"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18970"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19159"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20723"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21129"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21262"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21492"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21724"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22196"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23241"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23340"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23680"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24479"},{"type":"ADVISORY","url":"http://secunia.com/advisories/25607"},{"type":"ADVISORY","url":"http://secunia.com/advisories/25936"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:034"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_08_openssh.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-255-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/0306"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/2490"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/4869"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/0930"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/2120"},{"type":"ARTICLE","url":"http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability"},{"type":"REPORT","url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026"},{"type":"WEB","url":"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch"},{"type":"WEB","url":"http://docs.info.apple.com/article.html?artnum=305214"},{"type":"WEB","url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"type":"WEB","url":"http://securityreason.com/securityalert/462"},{"type":"WEB","url":"http://securitytracker.com/id?1015540"},{"type":"WEB","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml"},{"type":"WEB","url":"http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html"},{"type":"WEB","url":"http://www.osvdb.org/22692"},{"type":"WEB","url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0044.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0298.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0698.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/425397/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/16369"},{"type":"WEB","url":"http://www.trustix.org/errata/2006/0004"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"type":"WEB","url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"type":"WEB","url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"type":"WEB","url":"http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688"},{"type":"WEB","url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24305"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962"}],"schema_version":"1.7.3"}