Description
man before 1.5l allows attackers to execute arbitrary code via a malformed man file with improper quotes, which causes the my_xsprintf function to return a string with the value "unsafe," which is then executed as a program via a system call if it is in the search path of the user who runs man.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jack Lloyd · textlocallinux
https://www.exploit-db.com/exploits/22344
References (7)
Core 7
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/7066
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-134.html
Mailing List vendor-advisory
x_refsource_gentoo
http://marc.info/?l=bugtraq&m=104802285112752&w=2
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-133.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104740927915154&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11512
Vendor Advisory vendor-advisory
x_refsource_conectiva
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000620
Scores
EPSS
0.0189
EPSS Percentile
83.3%
Details
Status
published
Products (5)
andries_brouwer/man
1.5h1
andries_brouwer/man
1.5i
andries_brouwer/man
1.5i2
andries_brouwer/man
1.5j
andries_brouwer/man
1.5k
Published
Mar 18, 2003
Tracked Since
Feb 18, 2026