Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Jul 2017 23:50:03 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2017-1000083: evince: Command injection
 vulnerability in CBT handler

Hi,

When I saw this and the proposed fix (the backport fix, not the one in
git head), which was to remove tar support, but leave the command line
calling of all the other tools looked suspicious to me.

I played around a while, I haven't been able to find any more command
injections. However I discussed this with Tobias Müller and he found
out that another evince backend - the dvi one - also calls a shell
command with insufficient escaping:
https://bugzilla.gnome.org/show_bug.cgi?id=784947

While I didn't find any more command injections, I figured out that
with a password protected zip file as a cbz one can cause evince to
hang:
https://bugzilla.gnome.org/show_bug.cgi?id=784963

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ