vendor:
Evince
by:
Matlink
7.8
CVSS
HIGH
Command Injection
78
CWE
Product Name: Evince
Affected Version From: 3.24.0
Affected Version To: 3.24.0
Patch Exists: YES
Related CWE: CVE-2017-1000083
CPE: o:gnome:evince
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-1000083/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-1000083/
Other Scripts:
N/A
Platforms Tested: Debian sid
2017
evince command line injection
A command injection vulnerability was discovered in evince, a document viewer for multiple document formats. The vulnerability is caused due to the improper sanitization of user-supplied input when handling .cbt files. An attacker can exploit this vulnerability by creating a malicious .cbt file and tricking a user into opening it with evince. This will allow the attacker to execute arbitrary commands on the vulnerable system.
Mitigation:
Users should avoid opening untrusted .cbt files with evince. Additionally, administrators should ensure that evince is updated to the latest version.