![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.703994 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-3994-1) |
Summary: | The remote host is missing an update for the Debian 'nautilus' package(s) announced via the DSA-3994-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'nautilus' package(s) announced via the DSA-3994-1 advisory. Vulnerability Insight: Christian Boxdorfer discovered a vulnerability in the handling of FreeDesktop.org .desktop files in Nautilus, a file manager for the GNOME desktop environment. An attacker can craft a .desktop file intended to run malicious commands but displayed as a innocuous document file in Nautilus. An user would then trust it and open the file, and Nautilus would in turn execute the malicious content. Nautilus protection of only trusting .desktop files with executable permission can be bypassed by shipping the .desktop file inside a tarball. For the oldstable distribution (jessie), this problem has not been fixed yet. For the stable distribution (stretch), this problem has been fixed in version 3.22.3-1+deb9u1. For the testing distribution (buster), this problem has been fixed in version 3.26.0-1. For the unstable distribution (sid), this problem has been fixed in version 3.26.0-1. We recommend that you upgrade your nautilus packages. Affected Software/OS: 'nautilus' package(s) on Debian 9. Solution: Please install the updated package(s). CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-14604 BugTraq ID: 101012 http://www.securityfocus.com/bid/101012 Debian Security Information: DSA-3994 (Google Search) http://www.debian.org/security/2017/dsa-3994 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860268 https://bugzilla.gnome.org/show_bug.cgi?id=777991 https://github.com/GNOME/nautilus/commit/1630f53481f445ada0a455e9979236d31a8d3bb0 https://github.com/GNOME/nautilus/commit/bc919205bf774f6af3fa7154506c46039af5a69b https://github.com/freedomofpress/securedrop/issues/2238 https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/ RedHat Security Advisories: RHSA-2018:0223 https://access.redhat.com/errata/RHSA-2018:0223 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |