Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
References
Configurations
History
21 Nov 2024, 08:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/linuxdeepin/deepin-reader/commit/4db7a079fb7bd77257b1b9208a7ab26aade8fe04 - Patch | |
References | () https://github.com/linuxdeepin/deepin-reader/commit/c192fd20a2fe4003e0581c3164489a89e06420c6 - Patch | |
References | () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.3 |
03 Jan 2024, 20:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Deepin deepin Reader
Deepin |
|
CPE | cpe:2.3:a:deepin:deepin_reader:*:*:*:*:*:*:*:* | |
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495 - Exploit, Vendor Advisory | |
References | () https://github.com/linuxdeepin/deepin-reader/commit/4db7a079fb7bd77257b1b9208a7ab26aade8fe04 - Patch | |
References | () https://github.com/linuxdeepin/deepin-reader/commit/c192fd20a2fe4003e0581c3164489a89e06420c6 - Patch |
22 Dec 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-22 17:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50254
Mitre link : CVE-2023-50254
CVE.ORG link : CVE-2023-50254
JSON object : View
Products Affected
deepin
- deepin_reader