Vulnerability Description
lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lilypond | Lilypond | 2.19.80 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/898373Issue TrackingThird Party Advisory
- https://bugs.debian.org/898373Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-10992?
CVE-2018-10992 is a vulnerability with a CVSS score of 9.8 (CRITICAL). lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injec...
How severe is CVE-2018-10992?
CVE-2018-10992 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-10992?
Check the references section above for vendor advisories and patch information. Affected products include: Lilypond Lilypond.