Mandrake Linux Security Advisory : xpdf (MDKSA-2000:041-1)

High Nessus Plugin ID 61834


The remote Mandrake Linux host is missing a security update.


There is a potential race condition when using tmpnam() and fopen() in xpdf versions prior to 0.91. This exploit can be only used as root to overwrite arbitrary files if a symlink is created between the calls to tmpname() and fopen(). There is also a problem with malicious URL-type links in PDF documents that contain quote characters which could also potentially be used to execute arbitrary commands. This is due to xpdf calling system() with a netscape (or similar) command plus the URL.
The 0.91 release of xpdf fixes both of these potential problems.
Although there are no known exploits, users are encouraged to upgrade their system with these updates.

Update :

There was an incorrect dependency on the t1lib package in the previous updates for xpdf for Linux-Mandrake 6.x and 7.0. This update resolves those dependency issues.


Update the affected xpdf package.

Plugin Details

Severity: High

ID: 61834

File Name: mandrake_MDKSA-2000-041.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2012/09/06

Modified: 2015/12/30

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:xpdf, cpe:/o:mandrakesoft:mandrake_linux:6.0, cpe:/o:mandrakesoft:mandrake_linux:6.1, cpe:/o:mandrakesoft:mandrake_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2000/09/25

Reference Information

MDKSA: 2000:041-1