Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 650892

Summary: app-office/abiword: Argument injection vulnerability through BROWSER env var
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: normal CC: gnome, soap
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.abisource.com/show_bug.cgi?id=13908
See Also: https://bugs.debian.org/884923
Whiteboard: B2 [upstream cve]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2018-03-19 14:53:45 UTC
CVE-2017-17529 (https://nvd.nist.gov/vuln/detail/CVE-2017-17529):
  af/util/xp/ut_go_file.cpp in AbiWord 3.0.2-2 does not validate strings
  before launching the program specified by the BROWSER environment variable,
  which might allow remote attackers to conduct argument-injection attacks via
  a crafted URL.


@Maintainers please confirm if we are affected.

Thank you
Comment 1 David Seifert gentoo-dev 2020-04-13 16:41:09 UTC
@Security, Debian doesn't qualify this as a vulnerability, can we close it as WONTFIX?
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-06-12 12:48:19 UTC
Yeah, let's INVALID this bug. Doesn't seem like a real issue. If you can control USER's BROWSER var then you surely have other ways to get user access.