发布时间: 2024年4月26日
修改时间: 2024年5月17日
Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
NVD | openEuler | |
---|---|---|
CVSS评分 | 8.8 | 8.8 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | Required | Required |
Scope | Unchanged | Changed |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1506 | atril security update | 2024年5月10日 |
KylinSec-SA-2024-3492 | atril security update | 2024年5月10日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | atril | Fixed |
KY3.4-5A | atril | Fixed |
KY3.5.1 | atril | Fixed |
KY3.5.2 | atril | Fixed |