9.8
CVSSv3

CVE-2018-10992

Published: 11/05/2018 Updated: 24/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote malicious users to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.

Vulnerable Product Search on Vulmon Subscribe to Product

lilypond lilypond 2.19.80

Vendor Advisories

Debian Bug report logs - #884136 lilypond: CVE-2017-17523 Package: src:lilypond; Maintainer for src:lilypond is Don Armstrong <don@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 11 Dec 2017 20:15:01 UTC Severity: important Tags: confirmed, security, upstream Found in version lilypond/2 ...
Debian Bug report logs - #898373 lilypond: CVE-2018-10992 Package: src:lilypond; Maintainer for src:lilypond is Don Armstrong <don@debianorg>; Reported by: Gabriel Corona <gabrielcorona@enst-bretagnefr> Date: Thu, 10 May 2018 21:51:01 UTC Severity: important Tags: confirmed, security, upstream Found in versions l ...