Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Jul 2017 23:50:03 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2017-1000083: evince: Command injection
 vulnerability in CBT handler

Hi,

When I saw this and the proposed fix (the backport fix, not the one in
git head), which was to remove tar support, but leave the command line
calling of all the other tools looked suspicious to me.

I played around a while, I haven't been able to find any more command
injections. However I discussed this with Tobias Müller and he found
out that another evince backend - the dvi one - also calls a shell
command with insufficient escaping:
https://bugzilla.gnome.org/show_bug.cgi?id=784947

While I didn't find any more command injections, I figured out that
with a password protected zip file as a cbz one can cause evince to
hang:
https://bugzilla.gnome.org/show_bug.cgi?id=784963

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.