Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 631540 (CVE-2017-14604) - <gnome-base/nautilus-3.24.2.1: attackers can spoof a file type by using the .desktop file extension
Summary: <gnome-base/nautilus-3.24.2.1: attackers can spoof a file type by using the ....
Status: RESOLVED FIXED
Alias: CVE-2017-14604
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Low minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa cve]
Keywords:
Depends on: 599574
Blocks:
  Show dependency tree
 
Reported: 2017-09-20 16:31 UTC by Aleksandr Wagner (Kivak)
Modified: 2018-11-24 23:21 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-09-20 16:31:00 UTC
CVE-2017-14604 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14604):

GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field. 

References:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860268
https://bugzilla.gnome.org/show_bug.cgi?id=777991
https://github.com/GNOME/nautilus/commit/1630f53481f445ada0a455e9979236d31a8d3bb0
https://github.com/GNOME/nautilus/commit/bc919205bf774f6af3fa7154506c46039af5a69b
https://github.com/freedomofpress/securedrop/issues/2238
https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/

@Maintainer(s): Please state if the ebuild is ready for stabilization.
Comment 1 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-03-25 15:43:43 UTC
3.24.2.1 is stable.

GLSA Vote: No

@maintainers, please proceed with cleanup.
Comment 2 Pacho Ramos gentoo-dev 2018-03-28 18:25:28 UTC
We need newer version to be keyworded on arm
Comment 3 Mart Raudsepp gentoo-dev 2018-11-24 13:46:49 UTC
Cleanup done
Comment 4 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-11-24 23:21:10 UTC
(In reply to Mart Raudsepp from comment #3)
> Cleanup done

Thanks, Leio!