CVE-2008-0386
Summary
| CVE | CVE-2008-0386 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-02-04 23:00:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Gentoo | Xdg-utils | All | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 2007.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 2007.1 | All | x86_64 | All |
| Operating System | Mandrakesoft | Mandrake Linux | 2008.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 2008.0 | All | x86_64 | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE Security Summary Report SUSE-SR:2008:004 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Third Party Advisory |
| Gentoo Bug 207331 - x11-misc/xdg-utils < 1.0.2-r1: xdg-open/email URL arbitrary command execution (CVE-2008-0386) | af854a3a-2127-422b-91ae-364da2661108 | bugs.gentoo.org | Exploit |
| Gentoo update for xdg-utils - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [portland] Diff of /portland/xdg-utils/scripts/xdg-open.in | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Exploit |
| Bug 429513 – CVE-2008-0386 xdg-open allows to execute arbitrary commands | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking |
| Xdg-utils Command Injection Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Xdg-Utils: Arbitrary command execution — Gentoo Linux Documentation | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Advisories | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Third Party Advisory |
| xdg-utils 'xdg-open' and 'xdg-email' Multiple Remote Command Execution Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| [portland] Log of /portland/xdg-utils/scripts/xdg-email.in | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Exploit |
| SUSE Update for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | URL Repurposed |
| [portland] Diff of /portland/xdg-utils/scripts/xdg-email.in | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Exploit |
| [portland] Diff of /portland/xdg-utils/scripts/xdg-open | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Exploit |
| SecurityTracker.com Archives - Xdg-Utils Input Validation Flaws Let Remote Users Execute Arbitrary Commands | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| [portland] Diff of /portland/xdg-utils/scripts/xdg-email | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Exploit |
| [portland] Log of /portland/xdg-utils/scripts/xdg-open | af854a3a-2127-422b-91ae-364da2661108 | webcvs.freedesktop.org | Broken Link |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.