KICQ is an ICQ-compatible interactive messaging client for Unix. Versions of KICQ are vulnerable to remote execution of arbitrary commands embedded in URLs.
A maliciously-composed URL containing shell metacharacters and shell commands can be sent in an instant message by an attacker.
When the KICQ user clicks this link, the hostile code contained in the URL will execute with the privilege level of the user running KICQ.
* Attacker composes malicious URL, ie:
('.' characters = spaces)
* To the target user, the above URL appears to be:
* When the target user opens the URL, the shell commands contained within it (ie 'xterm') will be executed, potentially without warning to the user.
It is possible to send a malformed link to kicq that when clicked is passed to system() without being sanitized. By passing shell characters as a part of the link it's entirely possible to compromise the user account that is running kicq.
There is no published solution for this vulnerability in kicq, it's wise to use another package that has similar functionality. There are no known upgrades to fix this problem.