{"vuid":"VU#356070","idnumber":"356070","name":"Apple Terminal fails to properly sanitize input for \"x-man-page\" URI","keywords":["Apple Terminal","OS X","arbitrary code execution","x-man-page","apple_security_update_2005_005"],"overview":"Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing an attacker to execute arbitrary commands.","clean_desc":"Mac OS X 10.3 includes a URI handler called x-man-page. It causes Apple Terminal to display a man page by using a URI of this form: x-man-page://command. Applications such as Safari can link to x-man-page resources. Apple Terminal fails to sanitize input to the x-man-page URI handler. Escape characters embedded in the x-man-page URI could cause commands to be executed in the Terminal session.","impact":"By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system.","resolution":"Apply a patch\nApple advises all users to apply Apple Security Update 2005-005, as it fixes this flaw and other critical security flaws.","workarounds":"","sysaffected":"","thanks":"Thanks to David Remahl for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://docs.info.apple.com/article.html?artnum=301528","http://remahl.se/david/vuln/011/","http://secunia.com/advisories/15227/","http://www.securityfocus.com/bid/13502/","http://www.osvdb.org/displayvuln.php?osvdb_id=16084"],"cveids":["CVE-2005-1342"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-22T16:42:13Z","publicdate":"2005-05-03T00:00:00Z","datefirstpublished":"2005-05-06T19:50:08Z","dateupdated":"2005-05-16T16:10:22Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"14","cam_easeofexploitation":"20","cam_attackeraccessrequired":"17","cam_scorecurrent":"22.3125","cam_scorecurrentwidelyknown":"22.3125","cam_scorecurrentwidelyknownexploited":"40.1625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":22.3125,"vulnote":null}