First published: Wed Jan 21 2015(Updated: )
Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xdg-utils | 1.1.3-1+deb10u1 1.1.3-4.1 | |
Xdg-utils | =1.1.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9622 is classified as a high severity vulnerability due to the ability it provides for arbitrary code execution.
To fix CVE-2014-9622, update xdg-utils to version 1.1.3 or later.
CVE-2014-9622 affects xdg-utils version 1.1.0 RC1, particularly in Gentoo and Debian distributions.
Yes, CVE-2014-9622 can be exploited by context-dependent attackers through crafted URL arguments.
Exploiting CVE-2014-9622 can allow attackers to execute arbitrary code within the affected environment.