PT-2013-01: XML External Entity Injection in GNOME

(PT-2013-01) Positive Technologies Security Advisory
XML External Entity Injection in GNOME

Vulnerable software

GNOME
Version 3.8.1 and earlier

Application link:
http://www.gnome.org

Severity level

Severity level: Medium
Impact: Internal Network Resources Access, File System Access
Access Vector: Local  

CVSS v2: 
Base Score: 6.6 
Vector: (AV:L/AC:L/Au:N/C:C/I:N/A:C)

CVE: N/A

Software description

GNOME is a desktop environment and graphical user interface that runs on top of a computer operating system.

Vulnerability description

Positive Research Center experts have detected a local resources access vulnerability (files and internal network resources) via  XML External Entity enabled in GNOME.

An attacker is able to give a user a specially crafted file. If he or she views a folder with the file or opens it, librsvg sends local resource's contents  to the attacker's server.

How to fix

Update your software up to the latest version.

Advisory status

14.01.2013 - Vendor gets vulnerability details
16.05.2013 - Vendor releases fixed version and details
20.06.2013 - Public disclosure

Credits

This vulnerability have discovered by Timur Yunusov and Alexey Osipov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-01

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks.  Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+

Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software an...

30 september, 2013

Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability

A vulnerability in the Internet Key Exchange (IKE) protocol of Cisco IOS Software and Cisco ...

30 september, 2013

Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability

A vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IO...

30 september, 2013

MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)

This security update resolves a privately reported vulnerability in Microsoft Office.

08 april, 2014

MS14-019: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)

This security update resolves a publicly disclosed vulnerability in Microsoft Windows.

08 april, 2014

MS14-018: Cumulative Security Update for Internet Explorer (2950467)

This security update resolves six privately reported vulnerabilities in Internet Explorer.

08 april, 2014

This Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product

This Sun Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product.

14 april, 2010

This Alert Covers CVE-2010-0893 for the Mail Component of the Sun Convergence Product

This Alert covers CVE-2010-0893 for the mail component of the Sun Convergence product.

14 april, 2010

SunOS 5.10_x86: ucode driver patch

6905530 processor microcode code can panic when retrieving microcode revision.

02 february, 2010