Lucene search

K
archlinuxArchLinuxASA-201905-3
HistoryMay 06, 2019 - 12:00 a.m.

[ASA-201905-3] nautilus: sandbox escape

2019-05-0600:00:00
security.archlinux.org
21
nautilus
sandbox escape
3.32.1
gnome nautilus
security advisory

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.002

Percentile

59.1%

Arch Linux Security Advisory ASA-201905-3

Severity: High
Date : 2019-05-06
CVE-ID : CVE-2019-11461
Package : nautilus
Type : sandbox escape
Remote : No
Link : https://security.archlinux.org/AVG-956

Summary

The package nautilus before version 3.32.1-1 is vulnerable to sandbox
escape.

Resolution

Upgrade to 3.32.1-1.

pacman -Syu “nautilus>=3.32.1-1”

The problem has been fixed upstream in version 3.32.1.

Workaround

None.

Description

An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32
prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap
sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push
characters into the input buffer of the thumbnailer’s controlling
terminal, allowing an attacker to escape the sandbox if the thumbnailer
has a controlling terminal. This is due to improper filtering of the
TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.

Impact

A local attacker is able to escape the sandbox.

References

https://gitlab.gnome.org/GNOME/nautilus/issues/987
https://gitlab.gnome.org/GNOME/nautilus/commit/2ddba428ef2b13d0620bd599c3635b9c11044659
https://security.archlinux.org/CVE-2019-11461

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanynautilus< 3.32.1-1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.002

Percentile

59.1%