UBUNTU-CVE-2018-10992

Source
https://ubuntu.com/security/CVE-2018-10992
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-10992.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-10992
Related
Published
2018-05-11T22:29:00Z
Modified
2024-10-15T14:06:26Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.

References

Affected packages

Ubuntu:Pro:18.04:LTS / lilypond

Package

Name
lilypond
Purl
pkg:deb/ubuntu/lilypond?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.18.2-9
2.18.2-11
2.18.2-12
2.18.2-12build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}