Input validation error in Midnight Commander - CVE-2012-4463
Published: October 10, 2012 / Updated: August 11, 2020
Midnight Commander
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Midnight Commander (mc) 4.8.5 does not properly handle the (1) MC_EXT_SELECTED or (2) MC_EXT_ONLYTAGGED environment variables when multiple files are selected, which allows user-assisted remote attackers to execute arbitrary commands via a crafted file name.
How to mitigate CVE-2012-4463
Sources
- http://www.openwall.com/lists/oss-security/2012/10/03/4
- http://www.openwall.com/lists/oss-security/2012/10/03/5
- http://www.securityfocus.com/bid/55777
- https://bugs.gentoo.org/show_bug.cgi?id=436518#c7
- https://bugzilla.redhat.com/show_bug.cgi?id=862813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79033
- https://www.midnight-commander.org/ticket/2913