Skip to content

Muslim Entrepreneur & Software Engineer

I'm a Muslim entrepreneur and software engineer writing about life, tech, and faith. On this blog I share what I'm building, how I'm thinking, and where Islam guides me in the digital age. From AI experiments to blockchain projects to reflections on purpose, it's all part of the same journey.

Menu
  • Home
  • This Is Me
  • Get in touch
Menu
Critical code injection flaw in Gnome

Critical code injection flaw in Gnome file manager leaves Linux users open to hacking

Posted on July 27, 2017 by Asif Amod

After a recent inquiry, a form of susceptibility has been uncovered in the thumbnail handler section of GNOME files file manager that could allow hackers to carry out malicious code on specific Linux machines.After hailing it as Bad Taste, the vulnerability(CVE-2017-11421) was unearthed by German researcher Nils Dagsson Moskopp, who also provided evidence of concept code on his blog in order to exhibit the evidence of the vulnerability.

The code injection vulnerability inhabit dwells in “gnome-exeethumbnailer”- an instrument to spawn thumbnails from Windows executable files(.exe/msi/dll/lnk) for GNOME, which requires users to have Wine application connected on their systems to set it off.For those who are uninformed, Wine is a free and open-source software that permits Windows applications to run on the Linux operating system.

Moskopp found that while finding your way to a directory containing the msi file, GNOME Files resumes the filename as an executable input and run it so that an image thumbnail may be created.

In order to achieve a victorious development of the vulnerability, an assailant may direct a crafted Windows installer (MSI) file with malicious VBScript code in its filename, which, if downloaded on a susceptible system, it would cause damage to the machine without further collaboration. While exhibiting and clarifying his Poc Moskopp states that instead of parsing an MSI file in order to obtain its version number, this code invents a script comprising of the filename for which a thumbnail should be displayed and executes that using Wine.

He states further that the script is made utilizing a template which makes it likely to embed VBScript in a file name and activate its implementation. This defect may be taken advantage of by hackers utilizing other attack vectors as well, for example, by promptly slotting in a USB-drive with a malicious file saved on it, or distributing the malicious file via drive-by-downloads.

 

The Best Way To Save Yourself from Bad Taste

Moskopp conveyed the vulnerability to the GNOME Project and the Debian Project. The two of them repaired the vulnerability in the gnome-exe-thumbnailer file. The vulnerability upsets gnome-exe-thumbnailer before 0.9.5 version. You should run a Linux OS with the GNOME desktop, check for updates promptly before you become affected by this perilous vulnerability.

Moskopp, also advised users to:

  • Remove all files in /usr/share/thumbnailers
  • Do not utilise GNOME files

Uninstall any software that accelerates automatically, execution of filenames as code.

 

Moskopp also suggested that developers not utilize “bug-ridden ad-hoc parsers” to parse files, to completely identify inputs prior to processing them and to utilize unparsers instead of templates.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

About Me

Most people wake up to an alarm clock. I wake up to roosters and the hum of solar panels. Life out here isn’t always easy, but that’s the point. I have six kids, and we homeschool—actually, we unschool. No rigid curriculums, just learning through curiosity and real challenges.

Islam plays a huge role in my life. It reminds me that success isn’t just about money or status—it’s about what you do with what you’ve been given. I am the co-founder of an ethically focused digital agency where we build cloud software and marketing systems.

Read More

📧 Subscribe to Newsletter

Get weekly updates with our latest posts delivered to your inbox!

Subscribe to Our Newsletter

Get weekly updates with our latest posts and insights delivered to your inbox.

Powered by digitalmotion.io & hosting by hostwp.co