Russcom Ping Remote code execution

2006-05-25T00:00:00
ID SECURITYVULNS:DOC:12790
Type securityvulns
Reporter Securityvulns
Modified 2006-05-25T00:00:00

Description

Russcom Ping Remote code execution

Discovered by: Nomenumbra Date: 21/5/2006 impact:high (Remote code execution)

Russcom's Ping script allows attackers to execute arbitrary code trough command piping after the ip (e.g 127.0.0.1 | nc -l -p 666 -e /bin/sh would grant a bindshell)

Nomenumbra