7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a “—” command-line option substring, as demonstrated by a —checkpoint-action=exec=bash at the beginning of the filename.
Recent assessments:
pbarry-r7 at November 25, 2019 8:02pm UTC reported:
Does rely on a user to download and open an injected .cbt file with a vulnerable version of Evince (though the preview functionality of file manager software might trigger the injection without requiring the user to expressly open the file).
Assessed Attacker Value: 2
Assessed Attacker Value: 2Assessed Attacker Value: 3
seclists.org/oss-sec/2017/q3/128
www.debian.org/security/2017/dsa-3911
www.securityfocus.com/bid/99597
access.redhat.com/errata/RHSA-2017:2388
bugzilla.gnome.org/show_bug.cgi?id=784630
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083
github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
www.exploit-db.com/exploits/45824
www.exploit-db.com/exploits/46341
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P