Bug 1526142 (CVE-2017-17521)

Summary: CVE-2017-17521 fontforge: Command injetion in help function uiutil.c
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: eng-i18n-bugs, fonts-bugs, kevin, paul, pebarbos, pnemade
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-01-02 17:42:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1526143    
Bug Blocks: 1526144    
Attachments:
Description Flags
help function calls none

Description Pedro Sampaio 2017-12-14 20:30:54 UTC
A flaw was found in FontForge through 20170731. uiutil.c does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. A different vulnerability than CVE-2017-17534.

References:

https://security-tracker.debian.org/tracker/CVE-2017-17521

Comment 1 Pedro Sampaio 2017-12-14 20:31:23 UTC
Created fontforge tracking bugs for this issue:

Affects: fedora-all [bug 1526143]

Comment 2 Pedro Yóssis Silva Barbosa 2018-01-02 17:38:12 UTC
Created attachment 1375842 [details]
help function calls

Using a crafted URL, it is possible to inject command.

gbg> b *0x56f9bf

gdb> run --help

gbg> printf "%s", $rdi
"xdg-open" "http://fontforge.sf.net/overview.html" &

The thing is, though, the URL values seem to be all hardcoded and not possible to craft remotely (see attachment).

Comment 3 Pedro Yóssis Silva Barbosa 2018-01-02 17:42:27 UTC
Statement:

This issue affects the versions of fontforge as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 4 Parag Nemade 2018-01-14 04:46:42 UTC
Pedro,

Do you still want fedora bug open? I see this got closed as WONTFIX so fedora bug 1526143 should get closed as WONTFIX right?