Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-17354
HistoryApr 15, 2023 - 12:00 a.m.

CVE-2020-17354

2023-04-1500:00:00
ubuntu.com
ubuntu.com
10
lilypond
arbitrary code execution
scheme code
file format conversion
safe mode
external files
unix

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.4%

LilyPond before 2.24 allows attackers to bypass the -dsafe protection
mechanism via output-def-lookup or output-def-scope, as demonstrated by
dangerous Scheme code in a .ly file that causes arbitrary code execution
during conversion to a different file format. NOTE: in 2.24 and later
versions, safe mode is removed, and the product no longer tries to block
code execution when external files are used.

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.4%