A vulnerability has been discovered in Xdg-Utils, allowing for the remote execution of arbitrary commands.
Package | x11-misc/xdg-utils on all architectures |
---|---|
Affected versions | < 1.0.2-r1 |
Unaffected versions | >= 1.0.2-r1 |
Xdg-Utils is a set of tools allowing all applications to easily integrate with the Free Desktop configuration.
Miroslav Lichvar discovered that the "xdg-open" and "xdg-email" shell scripts do not properly sanitize their input before processing it.
A remote attacker could entice a user to open a specially crafted link with a vulnerable application using Xdg-Utils (e.g. an email client), resulting in the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All Xdg-Utils users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-misc/xdg-utils-1.0.2-r1"
Release date
January 30, 2008
Latest revision
January 30, 2008: 01
Severity
normal
Exploitable
remote
Bugzilla entries