Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 650892 - app-office/abiword: Argument injection vulnerability through BROWSER env var
Summary: app-office/abiword: Argument injection vulnerability through BROWSER env var
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.abisource.com/show_b...
Whiteboard: B2 [upstream cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-03-19 14:53 UTC by GLSAMaker/CVETool Bot
Modified: 2021-06-12 12:48 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2018-03-19 14:53:45 UTC
CVE-2017-17529 (https://nvd.nist.gov/vuln/detail/CVE-2017-17529):
  af/util/xp/ut_go_file.cpp in AbiWord 3.0.2-2 does not validate strings
  before launching the program specified by the BROWSER environment variable,
  which might allow remote attackers to conduct argument-injection attacks via
  a crafted URL.


@Maintainers please confirm if we are affected.

Thank you
Comment 1 David Seifert gentoo-dev 2020-04-13 16:41:09 UTC
@Security, Debian doesn't qualify this as a vulnerability, can we close it as WONTFIX?
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-06-12 12:48:19 UTC
Yeah, let's INVALID this bug. Doesn't seem like a real issue. If you can control USER's BROWSER var then you surely have other ways to get user access.