Gentoo alert 200306-11 (xpdf)
From: | Daniel Ahlberg <aliz@gentoo.org> | |
To: | gentoo-announce@gentoo.org | |
Subject: | GLSA: xpdf (200306-11) | |
Date: | Wed, 25 Jun 2003 23:49:03 +0200 |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200306-11 - - - --------------------------------------------------------------------- PACKAGE : xpdf SUMMARY : arbitrary code execution DATE : 2003-06-25 21:48 UTC EXPLOIT : remote VERSIONS AFFECTED : <xpdf-2.02.1 FIXED VERSION : >=xpdf-2.02.1 CVE : CAN-2003-0434 - - - --------------------------------------------------------------------- from advisory: "Valid PDF files can contain malicious external-type hyperlinks that can execute arbitrary shell commands underneath Unix with various PDF viewers/readers. The hyperlinks must be activated or followed for the malicious script to run. The obvious case is for a user to click on one. " Read the full advisory at http://marc.theaimsgroup.com/?l=full-disclosure&m=105555332025253&w=2 SOLUTION It is recommended that all Gentoo Linux users who are running app-text/xpdf upgrade to xpdf-2.02.1 as follows emerge sync emerge xpdf emerge clean - - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE++hjOfT7nyhUpoZMRAsvzAJ9FpDMIUV3e+WQZmTpmPr6yrqpC+QCePShi lhHeXjsGjVQPZNWxy8aUxFg= =IjqN -----END PGP SIGNATURE-----