Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-14604

Опубликовано: 20 сент. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4
CVSS3: 6.5

Описание

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

РелизСтатусПримечание
artful

not-affected

1:3.26.0-0ubuntu1
bionic

not-affected

1:3.26.0-0ubuntu1
cosmic

not-affected

1:3.26.0-0ubuntu1
devel

not-affected

1:3.26.0-0ubuntu1
disco

not-affected

1:3.26.0-0ubuntu1
eoan

not-affected

1:3.26.0-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
esm-infra/bionic

not-affected

1:3.26.0-0ubuntu1
esm-infra/focal

not-affected

1:3.26.0-0ubuntu1
esm-infra/xenial

needed

Показывать по

EPSS

Процентиль: 90%
0.05553
Низкий

4 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
почти 9 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

CVSS3: 6.5
nvd
около 8 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.

CVSS3: 6.5
debian
около 8 лет назад

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by ...

suse-cvrf
больше 7 лет назад

Security update for nautilus

suse-cvrf
больше 7 лет назад

Security update for nautilus

EPSS

Процентиль: 90%
0.05553
Низкий

4 Medium

CVSS2

6.5 Medium

CVSS3