First published: Wed Oct 03 2012(Updated: )
A security flaw was found in the way Midnight Commander, a user-friendly text console file manager and visual shell, performed sanitization of MC_EXT_SELECTED environment variable when multiple files were selected (first selected file was used as actual content of the MC_EXT_SELECTED variable, while the remaining files were provided as arguments to the temporary script, handling the F3 / Enter key press event). A remote attacker could provide a specially-crafted archive that, when expanded and previewed by the victim could lead to arbitrary code execution with the privileges of the user running mc executable. References: [1] <a href="https://bugs.gentoo.org/show_bug.cgi?id=436518">https://bugs.gentoo.org/show_bug.cgi?id=436518</a> Upstream ticket: [2] <a href="https://www.midnight-commander.org/ticket/2913">https://www.midnight-commander.org/ticket/2913</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Jason Alexander phNNTP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-862813 is classified as a medium security vulnerability.
To fix REDHAT-BUG-862813, update to the latest version of Midnight Commander that has addressed the sanitization flaw.
REDHAT-BUG-862813 affects systems running vulnerable versions of Midnight Commander.
REDHAT-BUG-862813 is a security flaw related to improper sanitization of environment variables.
REDHAT-BUG-862813 was reported by users within the Midnight Commander community and identified in bug tracking systems.