source: http://www.securityfocus.com/bid/47924/info klibc is prone to a shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary shell commands in the context of the application that uses the vulnerable library. Versions prior to klibc 1.5.22 are vulnerable. DNSDOMAIN="\\\"\$(echo owned; touch /tmp/owned)"
Related ExploitsTrying to match CVEs (1): CVE-2011-1930
Trying to match OSVDBs (1): 73394
Other Possible E-DB Search Terms: klibc 1.5.2, klibc