First published: Thu Dec 14 2017(Updated: )
library/www_browser.pl in SWI-Prolog 7.2.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/swi-prolog | <=8.0.2+dfsg-3+deb10u1<=8.2.4+dfsg-1<=9.0.4+dfsg-2 | |
SWI-Prolog | =7.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17524 has a medium severity due to its potential for argument-injection attacks.
You can fix CVE-2017-17524 by upgrading SWI-Prolog to version 8.0.2 or higher.
CVE-2017-17524 affects SWI-Prolog version 7.2.3 specifically.
CVE-2017-17524 facilitates argument-injection attacks through the BROWSER environment variable.
CVE-2017-17524 is a remote vulnerability that can be exploited by attackers.