Bug 438871 (CVE-2008-1467) - CVE-2008-1467 CenterIM passes unescaped URLs to shell
Summary: CVE-2008-1467 CenterIM passes unescaped URLs to shell
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-1467
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-03-25 17:41 UTC by Lubomir Kundrak
Modified: 2008-04-24 11:43 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-04-24 11:43:42 UTC
Embargoed:


Attachments (Terms of Use)

Description Lubomir Kundrak 2008-03-25 17:41:46 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-1467 to the following vulnerability:

CenterIM 4.22.3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a URI, related to "received URLs in the message window."

References:

http://www.milw0rm.com/exploits/5283
http://www.securityfocus.com/bid/28362
http://www.frsirt.com/english/advisories/2008/0956/references
http://secunia.com/advisories/29489

Comment 1 Lubomir Kundrak 2008-03-26 07:26:32 UTC
Patch in rawhide.
Stables will be updated in about a week, together with Yahoo IM fixes.

Comment 2 Fedora Update System 2008-04-01 21:37:16 UTC
centerim-4.22.4-1.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2008-04-01 21:37:28 UTC
centerim-4.22.4-1.fc7.1 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Red Hat Product Security 2008-04-24 11:43:42 UTC
This issue was addressed in:

Fedora:
  https://admin.fedoraproject.org/updates/F7/FEDORA-2008-2869
  https://admin.fedoraproject.org/updates/F8/FEDORA-2008-2867




Note You need to log in before you can comment on or make changes to this bug.