First published: Wed Oct 03 2012(Updated: )
A security flaw was found in the way Midnight Commander, a user-friendly text console file manager and visual shell, performed sanitization of MC_EXT_SELECTED environment variable when multiple files were selected (first selected file was used as actual content of the MC_EXT_SELECTED variable, while the remaining files were provided as arguments to the temporary script, handling the F3 / Enter key press event). A remote attacker could provide a specially-crafted archive that, when expanded and previewed by the victim could lead to arbitrary code execution with the privileges of the user running mc executable. References: [1] <a href="https://bugs.gentoo.org/show_bug.cgi?id=436518">https://bugs.gentoo.org/show_bug.cgi?id=436518</a> Upstream ticket: [2] <a href="https://www.midnight-commander.org/ticket/2913">https://www.midnight-commander.org/ticket/2913</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jason Alexander phNNTP | =4.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4463 is considered a moderate severity vulnerability.
CVE-2012-4463 affects Midnight Commander by allowing the MC_EXT_SELECTED environment variable to be improperly sanitized, which can lead to potential execution of unintended commands.
To fix CVE-2012-4463, update Midnight Commander to version 4.8.6 or later, which addresses the vulnerability.
CVE-2012-4463 is not typically considered remotely exploitable, as it requires local access to the system running Midnight Commander.
CVE-2012-4463 specifically affects Midnight Commander version 4.8.5.