Vulnerability Note VU#356070

Apple Terminal fails to properly sanitize input for "x-man-page" URI

Original Release date: 06 May 2005 | Last revised: 16 May 2005


Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing an attacker to execute arbitrary commands.


Mac OS X 10.3 includes a URI handler called x-man-page. It causes Apple Terminal to display a man page by using a URI of this form: x-man-page://command. Applications such as Safari can link to x-man-page resources.

Apple Terminal fails to sanitize input to the x-man-page URI handler. Escape characters embedded in the x-man-page URI could cause commands to be executed in the Terminal session.


By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system.


Apply a patch
Apple advises all users to apply Apple Security Update 2005-005, as it fixes this flaw and other critical security flaws.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer Inc.Affected01 Mar 200506 May 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to David Remahl for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CAN-2005-1342
  • Date Public: 03 May 2005
  • Date First Published: 06 May 2005
  • Date Last Updated: 16 May 2005
  • Severity Metric: 22.31
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.