Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/ | Third Party Advisory |
http://www.securityfocus.com/bid/93360 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/10/05/1 | Third Party Advisory |
http://www.debian.org/security/2016/dsa-3697 | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-10/msg00065.html | Third Party Advisory |
Information
Published : 2016-12-23 14:59
Updated : 2016-12-27 10:42
NVD link : CVE-2016-7966
Mitre link : CVE-2016-7966
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
kde
- kmail
debian
- debian_linux
suse
- linux_enterprise
fedoraproject
- fedora