Bug 168737 - CAN-2005-2968 Mozilla improper command line URL sanitization
Summary: CAN-2005-2968 Mozilla improper command line URL sanitization
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: mozilla
Version: 4.0
Hardware: All
OS: Linux
medium
high
Target Milestone: ---
: ---
Assignee: Christopher Aillon
QA Contact: Ben Levenson
URL:
Whiteboard: impact=important,public=20050906,repo...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-09-19 21:45 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-09-22 12:35:41 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2005-09-19 21:45:51 UTC
Upstream bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=307185

The URL passed to mozilla on the command line does not properly escape dangerous
characters before handing the URL to the shell.

Comment 1 Josh Bressers 2005-09-19 21:46:43 UTC
This issue should also affect RHEL2.1 and RHEL3

Comment 3 Mark J. Cox 2005-09-21 07:37:46 UTC
Note this is rated important not critical - a user would have to be tricked into
clicking on a link in an external application that contains the backtick characters.

Comment 4 Josh Bressers 2005-09-22 12:35:41 UTC
After investigating the shell scripts Red Hat ships, we have determined that our
Mozilla pakcages are not vulnerable to this issue.


Note You need to log in before you can comment on or make changes to this bug.