Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://lists.apple.com/archives/security-announce/2002/Sep/msg00001.html | mailing list patch vendor advisory |
http://www.securityfocus.com/bid/5768 | patch exploit vdb entry third party advisory broken link |
http://www.iss.net/security_center/static/10156.php | vdb entry patch broken link |
http://apple.slashdot.org/apple/02/09/21/122236.shtml?tid=172 | third party advisory |