Name | CVE-2017-16667 |
Description | backintime (aka Back in Time) before 1.1.24 did improper escaping/quoting of file paths used as arguments to the 'notify-send' command, leading to some parts of file paths being executed as shell commands within an os.system call in qt4/plugins/notifyplugin.py. This could allow an attacker to craft an unreadable file with a specific name to run arbitrary shell commands. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 881205 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
backintime (PTS) | bullseye | 1.2.1-3 | fixed |
| bookworm | 1.3.3-4 | fixed |
| sid, trixie | 1.5.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
backintime | source | wheezy | (not affected) | | | |
backintime | source | (unstable) | 1.1.24-0.1 | | | 881205 |
Notes
[stretch] - backintime <no-dsa> (Minor issue)
[jessie] - backintime <no-dsa> (Minor issue)
[wheezy] - backintime <not-affected> (Vulnerable code does not exist)
https://github.com/bit-team/backintime/issues/834
https://github.com/bit-team/backintime/commit/cef81d0da93ff601252607df3db1a48f7f6f01b3