TUCoPS :: Linux :: Apps N-Z :: xpdf.htm

Xpdf race condition
Vulnerability

    xpdf

Affected

    xpdf, xpdf-i

Description

    There  is  a  potential  race  condation  when  using tmpnam() and
    fopen() in xpdf versions prior to 0.91.  This exploit can be  only
    used as root to overwrite arbitrary files if a symlink is  created
    between  the  calls  to  tmpname()  and  fopen().  There is also a
    problem  with  malicious  URL-type  links  in  PDF  documents that
    contain quote characters which  could also potentially be  used to
    execute arbitrary commands.  This is due to xpdf calling  system()
    with  a  netscape  (or  similar)  command  plus the URL.  The 0.91
    release of xpdf fixes both of these potential problems.   Although
    there  are  no  known  exploits,  users  are encouraged to upgrade
    their system with these updates.

Solution

    Patches for Linux Mandrake:

        Linux-Mandrake 6.0: 6.0/RPMS/xpdf-0.91-4mdk.i586.rpm
                            6.0/SRPMS/xpdf-0.91-4mdk.src.rpm

        Linux-Mandrake 6.1: 6.1/RPMS/xpdf-0.91-4mdk.i586.rpm
                            6.1/SRPMS/xpdf-0.91-4mdk.src.rpm

        Linux-Mandrake 7.0: 7.0/RPMS/xpdf-0.91-4mdk.i586.rpm
                            7.0/SRPMS/xpdf-0.91-4mdk.src.rpm

    For Debian:

        http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90-7.diff.gz
        http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90-7.dsc
        http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90.orig.tar.gz
        http://security.debian.org/dists/stable/updates/main/binary-alpha/xpdf_0.90-7_alpha.deb
        http://security.debian.org/dists/stable/updates/main/binary-i386/xpdf_0.90-7_i386.deb
        http://security.debian.org/dists/stable/updates/main/binary-m68k/xpdf_0.90-7_m68k.deb
        http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpdf_0.90-7_powerpc.deb
        http://security.debian.org/dists/stable/updates/main/binary-sparc/xpdf_0.90-7_sparc.deb

    For Caldera Linux:

        ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/xpdf-0.91-3.i386.rpm
        ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS/xpdf-0.91-3.src.rpm
        ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/xpdf-0.91-3.i386.rpm
        ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS/xpdf-0.91-3.src.rpm
        ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/xpdf-0.91-3.i386.rpm
        ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS/xpdf-0.91-3.src.rpm

    For RedHat:

        ftp://updates.redhat.com/5.2/sparc/xpdf-0.91-1.5x.sparc.rpm
        ftp://updates.redhat.com/5.2/alpha/xpdf-0.91-1.5x.alpha.rpm
        ftp://updates.redhat.com/5.2/i386/xpdf-0.91-1.5x.i386.rpm
        ftp://updates.redhat.com/5.2/SRPMS/xpdf-0.91-1.5x.src.rpm
        ftp://updates.redhat.com/6.2/sparc/xpdf-0.91-1.6x.sparc.rpm
        ftp://updates.redhat.com/6.2/alpha/xpdf-0.91-1.6x.alpha.rpm
        ftp://updates.redhat.com/6.2/i386/xpdf-0.91-1.6x.i386.rpm
        ftp://updates.redhat.com/6.2/SRPMS/xpdf-0.91-1.6x.src.rpm

    For Conectiva Linux:

        ftp://atualizacoes.conectiva.com.br/4.0es/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/4.0es/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/4.1/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/4.2/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/5.0/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/5.1/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/xpdf-0.91-1cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/SRPMS/xpdf-0.91-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/xpdf-0.91-1cl.i386.rpm

    For FreeBSD:

        ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/graphics/xpdf-0.91.tgz
        ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/graphics/xpdf-0.91.tgz
        ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/graphics/xpdf-0.91.tgz
        ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/graphics/xpdf-0.91.tgz
        ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/graphics/xpdf-0.91.tgz

    xpdf-i < 0.90-7 is vulnerable, too.  But now is fixed.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH