[Clipart] [Bug 3354] New: no scanning for malware

bugzilla-daemon at freedesktop.org bugzilla-daemon at freedesktop.org
Fri May 20 11:10:12 PDT 2005


Please do not reply to this email: if you want to comment on the bug, go to    
       
the URL shown below and enter yourcomments there.     
   
https://bugs.freedesktop.org/show_bug.cgi?id=3354          
     
           Summary: no scanning for malware
           Product: openclipart.org
           Version: unspecified
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tools
        AssignedTo: clipart at lists.freedesktop.org
        ReportedBy: andrew.archibald at mail.mcgill.ca


SVG can contain javascript; few viewers currently execute this script, and all
(?) currently run it in an untrusted environment even if the file is loaded from
a local filesystem, but we can expect this to change as useful scripts appear in
SVG files.  In any case there are security holes in the script-executing
viewers. Thus it is possible for SVG to contain malware.

Currently, OCAL happily stores and redistributes SVG without any kind of
verification method, manual or automatic, to check for malware in SVG.

It is possible to write a script which simply rejects any script-containing
image; attached is a script which does so, although it is limited by the
presence of non-SVG XML in SVG files (such as inkscape-specific XML, metadata,
and Illustrator-specific XML, none of which can be reliably sanitized).          
     
     
--           
Configure bugmail: https://bugs.freedesktop.org/userprefs.cgi?tab=email         
     
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the clipart mailing list