Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-1877
Analyzed
More InfoOfficial Page
Source-security@debian.org
View Known Exploited Vulnerability (KEV) details
Published At-02 Jun, 2021 | 17:15
Updated At-14 Jun, 2021 | 14:01

The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

freedesktop.org
freedesktop
>>xdg-utils>>1.1.0
cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc1:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>7.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-77Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.debian.org/security/2015/dsa-3165security@debian.org
Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/02/18/7security@debian.org
Mailing List
Patch
Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/02/18/9security@debian.org
Mailing List
Patch
Third Party Advisory
http://www.securityfocus.com/bid/72675security@debian.org
Third Party Advisory
VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777722security@debian.org
Issue Tracking
Mailing List
Patch
Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=89129security@debian.org
Issue Tracking
Third Party Advisory
Change History
0Changes found

Details not found