Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-0223

Опубликовано: 25 янв. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-0223: nautilus security update (MODERATE)

[3.22.3-4]

  • Fix desktop files security issue (upstream bugzilla.gnome.org/777991) Resolves: #1490949

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

nautilus

3.22.3-4.el7_4

nautilus-devel

3.22.3-4.el7_4

nautilus-extensions

3.22.3-4.el7_4

Oracle Linux x86_64

nautilus

3.22.3-4.el7_4

nautilus-devel

3.22.3-4.el7_4

nautilus-extensions

3.22.3-4.el7_4

Связанные CVE

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 8 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

CVSS3: 4.8
redhat
почти 9 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

CVSS3: 6.5
nvd
около 8 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

CVSS3: 6.5
debian
около 8 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by ...

suse-cvrf
больше 7 лет назад

Security update for nautilus