Vulnerability Note VU#356070
Apple Terminal fails to properly sanitize input for "x-man-page" URI
Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing an attacker to execute arbitrary commands.
Mac OS X 10.3 includes a URI handler called x-man-page. It causes Apple Terminal to display a man page by using a URI of this form: x-man-page://command. Applications such as Safari can link to x-man-page resources.
Apple Terminal fails to sanitize input to the x-man-page URI handler. Escape characters embedded in the x-man-page URI could cause commands to be executed in the Terminal session.
By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system.
Apply a patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||01 Mar 2005||06 May 2005|
CVSS Metrics (Learn More)
Thanks to David Remahl for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CAN-2005-1342
- Date Public: 03 May 2005
- Date First Published: 06 May 2005
- Date Last Updated: 16 May 2005
- Severity Metric: 22.31
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.