ESB-2017.1761 - [Debian] evince: Execute arbitrary code/commands - Remote with user interaction 2017-07-17

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1761
                          evince security update
                               17 July 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           evince
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1000083  

Reference:         ESB-2017.1751

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3911

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3911-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 14, 2017                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : evince
CVE ID         : CVE-2017-1000083

Felix Wilhelm discovered that the Evince document viewer made insecure
use of tar when opening tar comic book archives (CBT). Opening a
malicious CBT archive could result in the execution of arbitrary code.
This update disables the CBT format entirely

For the oldstable distribution (jessie), this problem has been fixed
in version 3.14.1-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 3.22.1-3+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 3.22.1-4.

We recommend that you upgrade your evince packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=U0Uc
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RawX
-----END PGP SIGNATURE-----

« Back to bulletins