Summary: | <www-client/uzbl-2010.08.05: User-assisted execution of arbitrary commands via @SELECTED_URI (CVE-2010-2809) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Alexander (RETIRED) <wired> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | proxy-maint, tharvik |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.uzbl.org/news.php?id=29 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Alexander (RETIRED)
2010-08-06 10:54:41 UTC
Arches, please test and mark stable: =www-client/uzbl-2010.08.05 Target keywords : "amd64 x86" amd64 done All good x86. Builds and runs fine on x86. Please mark stable for x86. x86 stable, thanks David and Myckel CVE-2010-2809 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809): The default configuration of the <Button2> binding in Uzbl before 2010.08.05 does not properly use the @SELECTED_URI feature, which allows user-assisted remote attackers to execute arbitrary commands via a crafted HREF attribute of an A element in an HTML document. (Kéwan: Note: This bug has been handled, no maintainer actions are needed here.) This issue was resolved and addressed in GLSA 201412-08 at http://security.gentoo.org/glsa/glsa-201412-08.xml by GLSA coordinator Sean Amoss (ackle). |