Vulnerable Systems:Red Hat Red Hat Network Satellite Server 5.4
*JustSystems Ichitaro 2011 and prior
Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted file.
Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.