{"id":"USN-3503-1","summary":"evince vulnerability","details":"It was discovered that Evince incorrectly handled printing certain DVI\nfiles. If a user were tricked into opening and printing a specially-named\nDVI file, an attacker could use this issue to execute arbitrary code.\n","modified":"2026-02-10T04:41:15Z","published":"2017-12-04T14:18:31Z","related":["UBUNTU-CVE-2017-1000159"],"upstream":["CVE-2017-1000159","UBUNTU-CVE-2017-1000159"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3503-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000159"}],"affected":[{"package":{"name":"evince","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/evince@3.10.3-0ubuntu10.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.10.3-0ubuntu10.4"}]}],"versions":["3.10.0-0ubuntu2","3.10.0-0ubuntu3","3.10.2-0ubuntu1","3.10.3-0ubuntu1","3.10.3-0ubuntu2","3.10.3-0ubuntu3","3.10.3-0ubuntu4","3.10.3-0ubuntu5","3.10.3-0ubuntu6","3.10.3-0ubuntu7","3.10.3-0ubuntu8","3.10.3-0ubuntu9","3.10.3-0ubuntu10","3.10.3-0ubuntu10.1","3.10.3-0ubuntu10.2","3.10.3-0ubuntu10.3"],"ecosystem_specific":{"binaries":[{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"evince"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"evince-common"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"evince-gtk"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"gir1.2-evince-3.0"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"libevdocument3-4"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"libevince-dev"},{"binary_version":"3.10.3-0ubuntu10.4","binary_name":"libevview3-3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3503-1.json","cves_map":{"cves":[{"id":"CVE-2017-1000159","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"evince","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/evince@3.18.2-1ubuntu4.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.2-1ubuntu4.3"}]}],"versions":["3.16.1-0ubuntu1","3.18.1-1ubuntu1","3.18.1-1ubuntu2","3.18.2-1ubuntu1","3.18.2-1ubuntu2","3.18.2-1ubuntu3","3.18.2-1ubuntu4","3.18.2-1ubuntu4.1","3.18.2-1ubuntu4.2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"evince"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"evince-common"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"evince-gtk"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"gir1.2-evince-3.0"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"libevdocument3-4"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"libevince-dev"},{"binary_version":"3.18.2-1ubuntu4.3","binary_name":"libevview3-3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3503-1.json","cves_map":{"cves":[{"id":"CVE-2017-1000159","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}