Arbitrary Code Injection Affecting sensible-utils package, versions <0.0.9+deb9u1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-SENSIBLEUTILS-323135
- published 11 Dec 2017
- disclosed 11 Dec 2017
Introduced: 11 Dec 2017
CVE-2017-17512 Open this link in a new tabHow to fix?
Upgrade Debian:9
sensible-utils
to version 0.0.9+deb9u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream sensible-utils
package and not the sensible-utils
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.