UBUNTU-CVE-2018-10992

Source
https://ubuntu.com/security/CVE-2018-10992
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-10992.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-10992
Upstream
Published
2018-05-11T22:29:00Z
Modified
2025-07-16T08:22:07.204681Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.

References

Affected packages

Ubuntu:Pro:18.04:LTS / lilypond

Package

Name
lilypond
Purl
pkg:deb/ubuntu/lilypond@2.18.2-12build1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.18.2-9
2.18.2-11
2.18.2-12
2.18.2-12build1