Mandrake Linux Security Advisory : xpdf (MDKSA-2000:041-1)

high Nessus Plugin ID 61834

Synopsis

The remote Mandrake Linux host is missing a security update.

Description

There is a potential race condition when using tmpnam() and fopen() in xpdf versions prior to 0.91. This exploit can be only used as root to overwrite arbitrary files if a symlink is created between the calls to tmpname() and fopen(). There is also a problem with malicious URL-type links in PDF documents that contain quote characters which could also potentially be used to execute arbitrary commands. This is due to xpdf calling system() with a netscape (or similar) command plus the URL.
The 0.91 release of xpdf fixes both of these potential problems.
Although there are no known exploits, users are encouraged to upgrade their system with these updates.

Update :

There was an incorrect dependency on the t1lib package in the previous updates for xpdf for Linux-Mandrake 6.x and 7.0. This update resolves those dependency issues.

Solution

Update the affected xpdf package.

Plugin Details

Severity: High

ID: 61834

File Name: mandrake_MDKSA-2000-041.nasl

Version: 1.7

Type: local

Published: 9/6/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:xpdf, cpe:/o:mandrakesoft:mandrake_linux:6.0, cpe:/o:mandrakesoft:mandrake_linux:6.1, cpe:/o:mandrakesoft:mandrake_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 9/25/2000

Reference Information

MDKSA: 2000:041-1