CVE-2017-5078

Insufficient validation of untrusted input in Blink's mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98861 - () http://www.securityfocus.com/bid/98861 -
References () http://www.securitytracker.com/id/1038622 - () http://www.securitytracker.com/id/1038622 -
References () https://access.redhat.com/errata/RHSA-2017:1399 - () https://access.redhat.com/errata/RHSA-2017:1399 -
References () https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html -
References () https://crbug.com/711020 - () https://crbug.com/711020 -
References () https://security.gentoo.org/glsa/201706-20 - () https://security.gentoo.org/glsa/201706-20 -

07 Nov 2023, 02:48

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1038622 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038622 -
References (MISC) https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory () https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html -
References (MISC) https://crbug.com/711020 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://crbug.com/711020 -
References (GENTOO) https://security.gentoo.org/glsa/201706-20 - Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201706-20 -
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:1399 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1399 -
References (BID) http://www.securityfocus.com/bid/98861 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98861 -

Information

Published : 2017-10-27 05:29

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5078

Mitre link : CVE-2017-5078

CVE.ORG link : CVE-2017-5078


JSON object : View

Products Affected

linux

  • linux_kernel

apple

  • macos

microsoft

  • windows

google

  • chrome

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server