Skip to main content

CVE-2022-37290: n/a in n/a

Medium
VulnerabilityCVE-2022-37290cvecve-2022-37290
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.

AI-Powered Analysis

AILast updated: 06/25/2025, 17:58:04 UTC

Technical Analysis

CVE-2022-37290 is a medium-severity vulnerability affecting GNOME Nautilus version 42.2, a widely used file manager in Linux desktop environments, particularly in GNOME-based distributions. The vulnerability arises from a NULL pointer dereference triggered when a specially crafted ZIP archive is pasted into Nautilus. Specifically, the flaw occurs in the get_basename function, which is responsible for extracting the base name of files. When Nautilus attempts to process the malformed ZIP archive, it dereferences a NULL pointer, causing the application to crash. This is classified under CWE-476 (NULL Pointer Dereference), which typically leads to denial of service conditions. The CVSS 3.1 base score is 5.5 (medium severity), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access with low privileges, no user interaction, and results in a high impact on availability but no impact on confidentiality or integrity. There are no known exploits in the wild, and no patches or vendor-specific details are provided in the source information. The vulnerability does not allow for code execution or privilege escalation but can cause denial of service by crashing the Nautilus file manager, potentially disrupting user workflows or automated processes relying on Nautilus for file management.

Potential Impact

For European organizations, especially those relying on GNOME-based Linux desktops (common in government, research institutions, and enterprises favoring open-source environments), this vulnerability could lead to denial of service conditions on user workstations. While it does not compromise confidentiality or integrity, the crash of Nautilus can interrupt daily operations, cause loss of unsaved work, and potentially impact productivity. In environments where automated file handling or scripts depend on Nautilus, repeated crashes could disrupt business processes. Additionally, in sensitive or critical infrastructure sectors where Linux desktops are used for monitoring or control, such disruptions could have operational consequences. However, the requirement for local access and low privileges limits the threat to internal users or attackers who have already gained some foothold in the network. The absence of user interaction requirement means exploitation can be automated once local access is obtained, increasing the risk in multi-user or shared environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure GNOME Nautilus is updated to versions beyond 42.2 where this issue is resolved; if no official patch is available, consider applying community patches or disabling automatic handling of ZIP archives in Nautilus. 2) Restrict local access to trusted users only, employing strict user account controls and limiting the ability to paste or open untrusted ZIP archives. 3) Implement application whitelisting or sandboxing for Nautilus to contain crashes and prevent cascading failures. 4) Educate users about handling untrusted archives cautiously, especially when copying or pasting files from unknown sources. 5) Monitor system logs for repeated Nautilus crashes as an indicator of attempted exploitation or misuse. 6) In environments with automated file processing, consider alternative tools or scripts that do not rely on Nautilus for handling ZIP archives until the vulnerability is patched. 7) Employ endpoint detection and response (EDR) solutions to detect anomalous local activity that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-08-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbece94

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 5:58:04 PM

Last updated: 8/4/2025, 6:51:45 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats