Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 3 Oct 2012 11:36:30 -0400 (EDT)
From: Jan Lieskovsky <>
To: "Steven M. Christey" <>
Subject: CVE Request (minor) -- mc: Improper sanitization of MC_EXT_SELECTED
 variable when viewing multiple files

Hello Kurt, Steve, vendors,

  based on

A security flaw was found in the way Midnight Commander,
a user-friendly text console file manager and visual
shell, performed sanitization of MC_EXT_SELECTED
environment variable when multiple files were selected
(first selected file was used as actual content of the
MC_EXT_SELECTED variable, while the remaining files were
provided as arguments to the temporary script, handling
the F3 / Enter key press event). A remote attacker could
provide a specially-crafted archive that, when expanded
and previewed by the victim could lead to arbitrary code
execution with the privileges of the user running mc


Upstream ticket:

I need to confess this one is a bit on the border
(the attack to succeed the victim would need to
perform couple of steps), but basically the scenario
is possible.

Could you allocate a CVE id for this one?

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ