Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titleevince security update
Informations
NameDSA-4624First vendor Publication2020-02-14
VendorDebianLast vendor Modification2020-02-14
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities were discovered in evince, a simple multi-page document viewer.

CVE-2017-1000159

Tobias Mueller reported that the DVI exporter in evince is susceptible to a command injection vulnerability via specially crafted filenames.

CVE-2019-11459

Andy Nguyen reported that the tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend did not handle errors from TIFFReadRGBAImageOriented(), leading to disclosure of uninitialized memory when processing TIFF image files.

CVE-2019-1010006

A buffer overflow vulnerability in the tiff backend could lead to denial of service, or potentially the execution of arbitrary code if a specially crafted PDF file is opened.

For the oldstable distribution (stretch), these problems have been fixed in version 3.22.1-3+deb9u2.

For the stable distribution (buster), these problems have been fixed in version 3.30.2-3+deb10u1. The stable distribution is only affected by CVE-2019-11459.

We recommend that you upgrade your evince packages.

For the detailed security status of evince please refer to its security tracker page at: https://security-tracker.debian.org/tracker/evince

Original Source

Url : http://www.debian.org/security/2020/dsa-4624

CWE : Common Weakness Enumeration

%idName
50 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
50 %CWE-78Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Os4

Nessus® Vulnerability Scanner

DateDescription
2018-04-18Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201804-15.nasl - Type : ACT_GATHER_INFO
2018-01-19Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1009.nasl - Type : ACT_GATHER_INFO
2018-01-19Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1010.nasl - Type : ACT_GATHER_INFO
2017-12-28Name : The remote Fedora host is missing a security update.
File : fedora_2017-d6402c8005.nasl - Type : ACT_GATHER_INFO
2017-12-12Name : The remote Debian host is missing a security update.
File : debian_DLA-1204.nasl - Type : ACT_GATHER_INFO
2017-12-05Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3503-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-02-15 00:17:54
  • First insertion