Description


The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.

Related CPE's



o

debian

debian_linux

2

References



http://www.openwall.com/lists/oss-security/2015/02/18/7

Mailing ListPatchThird Party Advisory

http://www.openwall.com/lists/oss-security/2015/02/18/9

Mailing ListPatchThird Party Advisory

http://www.securityfocus.com/bid/72675

Third Party AdvisoryVDB Entry

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777722

Issue TrackingMailing ListPatchThird Party Advisory

https://bugs.freedesktop.org/show_bug.cgi?id=89129

Issue TrackingThird Party Advisory


http://www.openwall.com/lists/oss-security/2015/02/18/7

Mailing ListPatchThird Party Advisory

http://www.openwall.com/lists/oss-security/2015/02/18/9

Mailing ListPatchThird Party Advisory

http://www.securityfocus.com/bid/72675

Third Party AdvisoryVDB Entry

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777722

Issue TrackingMailing ListPatchThird Party Advisory

https://bugs.freedesktop.org/show_bug.cgi?id=89129

Issue TrackingThird Party Advisory

Weaknesses



CWE-77

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-06-02T15:15:08.037Z

4 years ago

Last modified

2024-11-21T01:26:19.223Z

1 year ago