Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form “$VAR/EVAR=arg”, which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
pulltheplug.org/users/core/files/x_osh3.sh
secunia.com/advisories/17527
secunia.com/advisories/17967
www.debian.org/security/2005/dsa-918
www.osvdb.org/20720
www.securityfocus.com/bid/15370
www.vupen.com/english/advisories/2005/2378
exchange.xforce.ibmcloud.com/vulnerabilities/23091