*** This bug is a security vulnerability *** You have been subscribed to a public security bug by Jamie Strandboge (jdstrand):
Binary package hint: nautilus An attacker may cause the user to run a .desktop file containing executable code, without that file having the executable attribute. I demonstration exploits are available here: http://robots.org.uk/fdo-desktop-entry-vulnerability/ If saved to the desktop, which may be the default for application/octet- stream this file appears as 'hot goats.jpg', with a photo icon. No indication is given that code will execute, should the file be opened. Clicking the icon causes the embedded python code to display a window containing the message 'owned'. Embedded code could do anything which the user has privileges to perform. This is an extremely short distance from download to execution of code and should be considered a serious vulnerability, akin to double extensions on MS Windows and execute attachments/downloads behavior. This issue has been discussed previously on the xdg mailing list: http://lists.freedesktop.org/archives/xdg/2006-April/006357.html However I feel the default behavior of Nautilus warrants this bug report. ** Affects: nautilus (Ubuntu) Importance: Undecided Status: New -- .desktop files provide simple infection vector for trojans https://bugs.launchpad.net/bugs/153438 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
