Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "binary_version": "3.36.10-0ubuntu1", "binary_name": "evince" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "evince-common" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "evince-dbgsym" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "gir1.2-evince-3.0" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "libevdocument3-4" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "libevdocument3-4-dbgsym" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "libevince-dev" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "libevview3-3" }, { "binary_version": "3.36.10-0ubuntu1", "binary_name": "libevview3-3-dbgsym" } ], "priority_reason": "Remote code execution vulnerability with available exploit and demo video." }