First published: Fri May 11 2018(Updated: )
lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LilyPond | =2.19.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10992 is considered a high severity vulnerability due to its potential for remote code execution through argument-injection attacks.
To fix CVE-2018-10992, upgrade to LilyPond version 2.19.81 or later where the vulnerability has been addressed.
Users of LilyPond version 2.19.80 are specifically affected by CVE-2018-10992.
The vulnerability in CVE-2018-10992 arises from insufficient validation of strings before executing the program specified by the BROWSER environment variable.
Yes, CVE-2018-10992 can lead to remote code execution through crafted URLs that initiate argument-injection attacks.