Description


The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.

Related CPE's



o

debian

debian_linux

2

References



http://www.openwall.com/lists/oss-security/2015/02/18/7

Mailing ListPatchThird Party Advisory

http://www.openwall.com/lists/oss-security/2015/02/18/9

Mailing ListPatchThird Party Advisory

http://www.securityfocus.com/bid/72675

Third Party AdvisoryVDB Entry

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777722

Issue TrackingMailing ListPatchThird Party Advisory

https://bugs.freedesktop.org/show_bug.cgi?id=89129

Issue TrackingThird Party Advisory

Weaknesses



CWE-77

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 · High

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2021-06-02T17:15:08.037

4 years ago

Last modified

2021-06-14T14:01:20.897

4 years ago