[16714] in bugtraq
Security Update: Security problems in xpdf
daemon@ATHENA.MIT.EDU (Technical Support)
Mon Sep 11 17:12:58 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <20000911121220.A25308@phoenix.calderasystems.com>
Date: Mon, 11 Sep 2000 12:12:20 -0600
Reply-To: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
From: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
X-To: announce@lists.calderasystems.com, linux-security@redhat.com
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: Security problems in xpdf
Advisory number: CSSA-2000-031.0
Issue date: 2000 September, 11
Cross reference:
______________________________________________________________________________
1. Problem Description
There are two security problems in xpdf, the PDF file viewer.
The first is that temporary files were created insecurely.
The second problem is that xpdf was not cautious enough when the
user clicked on a URL. Xpdf would start the URL viewer (netscape
by default) via the system shell, not properly taking care of
shell meta characters. This problem could be exploited by
creating PDF files that ran malicious code when the user selected
a URL in the document.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 All packages previous to
xpdf-0.91-3
OpenLinux eServer 2.3 All packages previous to
and OpenLinux eBuilder xpdf-0.91-3
OpenLinux eDesktop 2.4 All packages previous to
xpdf-0.91-3
3. Solution
Workaround:
None known.
4. OpenLinux Desktop 2.3
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
4.2 Verification
6582e3df8c2e677d4a7a0208322893eb RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv xpdf-0.91-3.i386.rpm
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
5.2 Verification
f0cf08c9febe6c7e16500812a140f846 RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv xpdf-0.91-3.i386.rpm
6. OpenLinux eDesktop 2.4
6.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
6.2 Verification
696e6851ecd8b348a9b4c0ef18fd94bd RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm
6.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv xpdf-0.91-3.i386.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 7686.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5vN7R18sy83A/qfwRAkHcAJ91DEnnUpoEpGguNkAgz9eZFeI79QCeLEqE
m3St8tV9m4o2VRmsK6QDVdM=
=IkLE
-----END PGP SIGNATURE-----