CVE-2017-1000159
Advisory lineage Upstream: 0 Downstream: 9
Deferred
Published: 27 Nov 2017, 15:00
Last modified:05 Aug 2024, 21:53
Vulnerability Summary
Overall Risk (default)
medium
31/100 CVSS Score
7.8 HIGH
v3.0 (nvd)
EPSS Score
0.36% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
27 Nov 2017, 15:00
Published
Vulnerability first disclosed
05 Aug 2024, 21:53
Last Modified
Vulnerability information updated
Description
Command injection in evince via filename when printing to PDF. This affects versions earlier than 3.25.91.
CVSS Metrics
- v3.0•HIGH•Score: 7.8CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- v2.0•MEDIUM•Score: 4.6AV:L/AC:L/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 0.36%• Percentile: 58%
Techniques & Countermeasures
- CWE-78•Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Affected Systems
- gnome•evince
< 3.25.91
References (7)
- https://security.gentoo.org/glsa/201804-15
- https://lists.debian.org/debian-lts-announce/2017/12/msg00006.html
- https://bugzilla.gnome.org/show_bug.cgi?id=784947
- https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html
- https://www.debian.org/security/2020/dsa-4624
- https://seclists.org/bugtraq/2020/Feb/18