First published: Wed Feb 11 2015(Updated: )
The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xdg-utils | 1.1.3-1+deb10u1 1.1.3-4.1 | |
debian/xdg-utils | <=1.0.2+cvs20100307-2<=1.1.0~rc1+git20111210-7.3 | 1.1.0~rc1+git20111210-7.4 1.1.0~rc1+git20111210-6+deb7u3 1.0.2+cvs20100307-2+deb6u1 |
Xdg-utils | =1.1.0-rc1 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1877 is classified as a high severity vulnerability that allows remote command execution.
To remediate CVE-2015-1877, update the xdg-utils package to version 1.1.3-1+deb10u1 or later.
CVE-2015-1877 affects xdg-utils versions up to and including 1.1.0~rc1+git20111210-7.3.
Yes, CVE-2015-1877 can be exploited by remote attackers through crafted files.
CVE-2015-1877 impacts various versions of Debian GNU/Linux including version 7.0 and 8.0.