Bug 918836 (CVE-2015-1877) - VUL-1: CVE-2015-1877: xdg-utils: Command injection vulnerability due to local variables collision in xdg-open
Summary: VUL-1: CVE-2015-1877: xdg-utils: Command injection vulnerability due to local...
Status: RESOLVED INVALID
Alias: CVE-2015-1877
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/113994/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-02-20 13:46 UTC by Johannes Segitz
Modified: 2016-04-27 20:18 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Reproducer (48.46 KB, image/jpeg)
2015-02-20 13:46 UTC, Johannes Segitz
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2015-02-20 13:46:43 UTC
Created attachment 624007 [details]
Reproducer

From: Jiri Horner <laeqten@gmail.com>

there is a long-standing issue with xdg-open on debian -- it parses all files it is trying to open. This is easily exploitable. Requirements are similar as in last RCE: Window Manager which is _NOT_ one of the following:

* KDE
* GNOME
* MATE
* XFCE
* ENLIGHTENMENT

Problem is caused by name collision in local variables, which are apparently not very local in this case (maybe also dash problem?)

========

This doesn't affect us since it only occurs with dash. We will include this in the next update (VUL-1) as a precaution.

References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5%3BfileNAME=xdg-OPEN.diff%3Batt=1;bug=777722#05652384962902024364
https://bugzilla.redhat.com/show_bug.cgi?id=1194205
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1877
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1877.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1877
Comment 1 Swamp Workflow Management 2015-02-20 23:00:35 UTC
bugbot adjusting priority
Comment 2 Antonio Larrosa 2015-04-30 16:36:17 UTC
It seems SLE12 is not affected even if it used dash (which it doesn't by default). The debian patch just changed the name of a local variable to a loop that clashed with a global variable. In our xdg-open version, we already use a different name that doesn't clash. Anyway, I'll empirically test it installing dash and check SLE11 too. openSUSE 13.2 is not affected neither for the same reasons.
Comment 3 Antonio Larrosa 2015-05-04 11:22:53 UTC
As expected, I couldn't reproduce the problem. So we are definitely not affected by this exploit in SLE12 nor openSUSE 13.2 . SLE11 (SP3) is using a really different version of xdg-open that doesn't have this problem neither.
Comment 5 Johannes Segitz 2015-05-04 11:55:15 UTC
nothing left to do, thanks for you work