CVE-2017-14604
Description
GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.
Affected products
4cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/GNOME/nautilus/commit/1630f53481f445ada0a455e9979236d31a8d3bb0nvdIssue TrackingPatchThird Party Advisory
- github.com/GNOME/nautilus/commit/bc919205bf774f6af3fa7154506c46039af5a69bnvdIssue TrackingPatchThird Party Advisory
- micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/nvdExploitThird Party Advisory
- www.debian.org/security/2017/dsa-3994nvdThird Party Advisory
- www.securityfocus.com/bid/101012nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2018:0223nvdThird Party Advisory
- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingThird Party Advisory
- bugzilla.gnome.org/show_bug.cginvdIssue TrackingVendor Advisory
- github.com/freedomofpress/securedrop/issues/2238nvdThird Party Advisory
News mentions
0No linked articles in our index yet.