Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
bugzilla.elinks.cz/show_bug.cgi?id=841
marc.info/?l=full-disclosure&m=116355556512780&w=2
secunia.com/advisories/22905
secunia.com/advisories/22920
secunia.com/advisories/22923
secunia.com/advisories/23022
secunia.com/advisories/23132
secunia.com/advisories/23188
secunia.com/advisories/23234
secunia.com/advisories/23389
secunia.com/advisories/23467
secunia.com/advisories/24005
secunia.com/advisories/24054
security.gentoo.org/glsa/glsa-200612-16.xml
securitytracker.com/id?1017232
securitytracker.com/id?1017233
www.debian.org/security/2006/dsa-1228
www.debian.org/security/2006/dsa-1240
www.gentoo.org/security/en/glsa/glsa-200701-27.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:216
www.novell.com/linux/security/advisories/2006_27_sr.html
www.redhat.com/support/errata/RHSA-2006-0742.html
www.securityfocus.com/archive/1/451870/100/200/threaded
www.securityfocus.com/bid/21082
www.trustix.org/errata/2007/0005
exchange.xforce.ibmcloud.com/vulnerabilities/30299
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11213
www.debian.org/security/2006/dsa-1226