First published: Tue Jul 15 2014(Updated: )
The following was reported: ... The function "rs_filter_graph" located in file ./librawstudio/rs-filter.c contains the following code: g_string_append_printf(str, "}\n"); g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NULL); ignore = system("dot -Tpng >/tmp/rs-filter-graph.png </tmp/rs-filter-graph"); ignore = system("gnome-open /tmp/rs-filter-graph.png"); This code makes insecure use of two temporary files: /tmp/rs-filter-graph.png /tmp/rs-filter-graph This allows the truncation of arbitrary files which are owned by the user running rawstudio - for example: ln -s ~/.important /tmp/rs-filter-graph ln -s /etc/shadow /tmp/rs-filter-graph.png
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rawstudio | <=2.0-1.1<=2.0-1 | |
debian/rawstudio | ||
Stormy Studios Knet | =2.0-1.1 | |
Red Hat Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4978 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2014-4978, update Rawstudio to version 2.0-1.1 or higher.
CVE-2014-4978 affects Rawstudio versions prior to 2.0-1.1.
CVE-2014-4978 impacts systems running Rawstudio on Debian and Fedora platforms.
Yes, there is potential for exploitation of CVE-2014-4978 through the insecure handling of user input.