Bug 1526142 (CVE-2017-17521)
| Summary: | CVE-2017-17521 fontforge: Command injetion in help function uiutil.c | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED WONTFIX | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | eng-i18n-bugs, fonts-bugs, kevin, paul, pebarbos, pnemade | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2018-01-02 17:42:17 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1526143 | ||||||
| Bug Blocks: | 1526144 | ||||||
| Attachments: |
|
||||||
|
Description
Pedro Sampaio
2017-12-14 20:30:54 UTC
Created fontforge tracking bugs for this issue: Affects: fedora-all [bug 1526143] Created attachment 1375842 [details] help function calls Using a crafted URL, it is possible to inject command. gbg> b *0x56f9bf gdb> run --help gbg> printf "%s", $rdi "xdg-open" "http://fontforge.sf.net/overview.html" & The thing is, though, the URL values seem to be all hardcoded and not possible to craft remotely (see attachment). Statement: This issue affects the versions of fontforge as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Pedro, Do you still want fedora bug open? I see this got closed as WONTFIX so fedora bug 1526143 should get closed as WONTFIX right? |