Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title evince security update
Informations
Name DSA-4624 First vendor Publication 2020-02-14
Vendor Debian Last vendor Modification 2020-02-14
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities were discovered in evince, a simple multi-page document viewer.

CVE-2017-1000159

Tobias Mueller reported that the DVI exporter in evince is susceptible to a command injection vulnerability via specially crafted filenames.

CVE-2019-11459

Andy Nguyen reported that the tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend did not handle errors from TIFFReadRGBAImageOriented(), leading to disclosure of uninitialized memory when processing TIFF image files.

CVE-2019-1010006

A buffer overflow vulnerability in the tiff backend could lead to denial of service, or potentially the execution of arbitrary code if a specially crafted PDF file is opened.

For the oldstable distribution (stretch), these problems have been fixed in version 3.22.1-3+deb9u2.

For the stable distribution (buster), these problems have been fixed in version 3.30.2-3+deb10u1. The stable distribution is only affected by CVE-2019-11459.

We recommend that you upgrade your evince packages.

For the detailed security status of evince please refer to its security tracker page at: https://security-tracker.debian.org/tracker/evince

Original Source

Url : http://www.debian.org/security/2020/dsa-4624

CWE : Common Weakness Enumeration

% Id Name
25 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)
25 % CWE-754 Improper Check for Unusual or Exceptional Conditions
25 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)
25 % CWE-78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Os 5
Os 3
Os 2
Os 2
Os 1
Os 4
Os 3
Os 3

Nessus® Vulnerability Scanner

Date Description
2018-04-18 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201804-15.nasl - Type : ACT_GATHER_INFO
2018-01-19 Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1009.nasl - Type : ACT_GATHER_INFO
2018-01-19 Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1010.nasl - Type : ACT_GATHER_INFO
2017-12-28 Name : The remote Fedora host is missing a security update.
File : fedora_2017-d6402c8005.nasl - Type : ACT_GATHER_INFO
2017-12-12 Name : The remote Debian host is missing a security update.
File : debian_DLA-1204.nasl - Type : ACT_GATHER_INFO
2017-12-05 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3503-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2020-02-15 00:17:54
  • First insertion