Gnome Nautilus [Denial of Service]
Gnome Nautilus <= v3.16 is vulnerable to DoS attack through a malicious crafted file.
A malicious crafted file can be used to perform a DoS attack in Nautilus. The attacker must have local access to affected system or convince the victim to download the file (email, web url etc.). Next time the victim tries to open the directory that contains the malicious file, Nautilus crashes without warning.
The file must have a
.jp2 extension and start with the JPEG signature (
This seems to happen every time Nautilus is trying to update the thumbnail of the file.
In Ubuntu and Fedora process dies with the message:
Premature end of JPEG file JPEG datastream contains no image
This vulnerability seems to affect all Nautilus versions up to 3.16.
- Create a file without a
.jp2extension in an affected system
- Open the file in a hex editor so it start with the JPEG signature (
- Rename the file so it has the
- Open directory with Nautilus
- Nautilus dies without warning
Requested CVE ID
Vendor notified at firstname.lastname@example.org
Requested CVE ID (no response from 2015-10-27)
Requested CVE ID (no response from 2015-11-11)