CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
54.5%
Issue Overview:
Insufficient validation of trust of .desktop files with execute permission
An untrusted .desktop file with executable permission set could choose its displayed name and icon, and execute commands without warning when opened by the user. An attacker could use this flaw to trick a user into opening a .desktop file disguised as a document, such as a PDF, and execute arbitrary commands.(CVE-2017-14604)
Affected Packages:
nautilus
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update nautilus to update your system.
New Packages:
src:
nautilus-3.22.3-4.amzn2.src
x86_64:
nautilus-3.22.3-4.amzn2.x86_64
nautilus-extensions-3.22.3-4.amzn2.x86_64
nautilus-devel-3.22.3-4.amzn2.x86_64
nautilus-debuginfo-3.22.3-4.amzn2.x86_64
Red Hat: CVE-2017-14604
Mitre: CVE-2017-14604
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | x86_64 | nautilus | < 3.22.3-4.amzn2 | nautilus-3.22.3-4.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nautilus-extensions | < 3.22.3-4.amzn2 | nautilus-extensions-3.22.3-4.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nautilus-devel | < 3.22.3-4.amzn2 | nautilus-devel-3.22.3-4.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nautilus-debuginfo | < 3.22.3-4.amzn2 | nautilus-debuginfo-3.22.3-4.amzn2.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
54.5%