Description
swt/motif/browser.c in White_dune (aka whitedune) 0.30.10 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: This issue is being disputed as not being a vulnerability because “the current version of white_dune (1.369 at https://wdune.ourproject.org/) do not use a "BROWSER environment variable". Instead, the "browser" variable is read from the $HOME/.dunerc file (or from the M$Windows registry). It is configurable in the "options" menu. The default is chosen in the ./configure script, which tests various programs, first tested is "xdg-open".
Published: 2017-12-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

White Dune Project White Dune
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:51:32.315Z

Reserved: 2017-12-11T00:00:00.000Z

Link: CVE-2017-17518

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-12-14T16:29:00.557

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-17518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses