search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple Terminal fails to properly sanitize input for "x-man-page" URI

Vulnerability Note VU#356070

Original Release Date: 2005-05-06 | Last Revised: 2005-05-16


Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing an attacker to execute arbitrary commands.


Mac OS X 10.3 includes a URI handler called x-man-page. It causes Apple Terminal to display a man page by using a URI of this form: x-man-page://command. Applications such as Safari can link to x-man-page resources.

Apple Terminal fails to sanitize input to the x-man-page URI handler. Escape characters embedded in the x-man-page URI could cause commands to be executed in the Terminal session.


By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system.


Apply a patch
Apple advises all users to apply Apple Security Update 2005-005, as it fixes this flaw and other critical security flaws.

Vendor Information


Apple Computer Inc. Affected

Notified:  March 01, 2005 Updated: May 06, 2005



Vendor Statement

This is addressed in Security Update 2005-005. Further information is available at:

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to David Remahl for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2005-1342
Severity Metric: 22.31
Date Public: 2005-05-03
Date First Published: 2005-05-06
Date Last Updated: 2005-05-16 16:10 UTC
Document Revision: 9

Sponsored by CISA.