CVE-2017-1000083 is still present on atril

Bug #1800662 reported by Matlink on 2018-10-30
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
atril (Ubuntu)
High
Martin Wimpress

Bug Description

.cbt forged file can be used to inject command line when opening it with atril. Since atril is sometimes the default PDF viewer for nautilus .cbt thumbnails, this command line can be executed even if the file is not actively opened by the user. See attachment for POC (this will open firefox on google.com and touch a file named covfefe.evince).

Description: Ubuntu 16.04.5 LTS
Release: 16.04

Atril version 1.12.2-1ubuntu0.3

CVE References

Matlink (matlink-w) wrote :
Alex Murray (alexmurray) on 2018-10-31
information type: Private Security → Public Security
Changed in atril (Ubuntu):
importance: Undecided → High
assignee: nobody → Martin Wimpress (flexiondotorg)
Marc Deslauriers (mdeslaur) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

tags: added: community-security
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers