DEBIAN-CVE-2014-7209

Source
https://security-tracker.debian.org/tracker/CVE-2014-7209
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-7209.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2014-7209
Upstream
Downstream
Published
2015-01-06T15:59:02.663Z
Modified
2026-03-11T07:16:17.917484Z
Summary
[none]
Details

run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.

References

Affected packages

Debian:11 / mime-support

Package

Name
mime-support
Purl
pkg:deb/debian/mime-support?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.58

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-7209.json"

Debian:12 / mime-support

Package

Name
mime-support
Purl
pkg:deb/debian/mime-support?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.58

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-7209.json"