This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: GNOME Evince suffers from **Command Injection**. <br>π₯ **Consequences**: Attackers can execute **arbitrary commands** on the victim's system.β¦
π οΈ **Root Cause**: Flaw in `backend/comics/comics-document.c`. <br>π **Flaw**: Improper handling of **Comic Book (CBT)** files. <br>β οΈ **CWE**: Not explicitly defined in data, but clearly a **Command Injection** flaw.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: GNOME Evince users. <br>π **Version**: Versions **prior to 3.24.1**. <br>π₯οΈ **Component**: The **Comic Book backend** module.
Q4What can hackers do? (Privileges/Data)
π» **Hackers' Power**: Execute **arbitrary commands**. <br>π **Privileges**: Likely runs with **user privileges** of the victim opening the file.β¦
πͺ **Threshold**: **Low**. <br>π€ **Auth**: No authentication required. <br>π **Config**: Victim just needs to **open/view** a malicious `.cbt` file. <br>β‘ **Ease**: Remote exploitation via file opening.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp**: **YES**. <br>π¦ **PoC**: Available on GitHub (`matlink/evince-cve-2017-1000083`). <br>π£ **Exploit-DB**: CVE-46341 and CVE-45824 listed. <br>π **Wild Exploitation**: High risk due to available PoCs.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **Evince versions < 3.24.1**. <br>π **File Type**: Monitor for malicious `.cbt` files. <br>π‘οΈ **Tools**: Use vulnerability scanners detecting this specific CVE ID.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **YES**. <br>π§ **Patch**: Upgrade to **Evince 3.24.1** or later. <br>π’ **Advisories**: Red Hat (RHSA-2017:2388) and Debian (DSA-3911) issued fixes.
Q9What if no patch? (Workaround)
π« **No Patch?**: **Disable** the Comic Book backend if possible. <br>π **Behavior**: Do **NOT** open `.cbt` files from untrusted sources. <br>π **Alternative**: Use a different PDF/document viewer that is patched.