First published: Tue Jun 06 2017(Updated: )
Insufficient validation of untrusted input in Blink's mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5078 is classified as a medium severity vulnerability due to its potential for command injection attacks.
To fix CVE-2017-5078, update Google Chrome to version 59.0.3071.86 or later.
CVE-2017-5078 affects Google Chrome versions prior to 59.0.3071.86.
CVE-2017-5078 impacts Google Chrome running on Linux, Windows, and Mac.
Yes, CVE-2017-5078 allows remote attackers to exploit the vulnerability through crafted HTML pages.