swt/motif/browser.c in White_dune (aka whitedune) 0.30.10 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: This issue is being disputed as not being a vulnerability because “the current version of white_dune (1.369 at https://wdune.ourproject.org/) do not use a "BROWSER environment variable". Instead, the "browser" variable is read from the $HOME/.dunerc file (or from the M$Windows registry). It is configurable in the "options" menu. The default is chosen in the ./configure script, which tests various programs, first tested is "xdg-open".
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:51:32.315Z

Reserved: 2017-12-11T00:00:00

Link: CVE-2017-17518

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-12-14T16:29:00.557

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-17518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses