Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Jul 2017 23:50:03 +0200
From: Hanno Böck <>
Subject: Re: CVE-2017-1000083: evince: Command injection
 vulnerability in CBT handler


When I saw this and the proposed fix (the backport fix, not the one in
git head), which was to remove tar support, but leave the command line
calling of all the other tools looked suspicious to me.

I played around a while, I haven't been able to find any more command
injections. However I discussed this with Tobias Müller and he found
out that another evince backend - the dvi one - also calls a shell
command with insufficient escaping:

While I didn't find any more command injections, I figured out that
with a password protected zip file as a cbz one can cause evince to

Hanno Böck

GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.