First published: Mon Feb 13 2012(Updated: )
An insufficient escape sequences sanitization flaw was found in the way xpdf, a PDF file viewer for the X window system, and poppler, a PDF rendering library, performed sanitization of certain characters to be displayed in the error messages, which arose during presentation of certain PDF files. A remote attacker could use this flaw to modify a window's title, or, possibly execute arbitrary commands or overwrite files, via a specially-crafted PDF file containing an escape sequence for a terminal emulator if local, unsuspecting user opened such crafted PDF file in xpdf or in an application linked against poppler library (for example evince).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
freedesktop poppler | <0.21.4 | |
Xpdf | =3.02 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
openSUSE | =12.2 |
http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40
http://cgit.freedesktop.org/poppler/poppler/commit/NEWS?id=2bc48d5369f1dbecfc4db2878f33bdeb80d8d90f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2012-2142.
The severity of vulnerability CVE-2012-2142 is high with a severity value of 7.8.
The software versions affected by CVE-2012-2142 are poppler before 0.21.4, Xpdfreader 3.02, Redhat Enterprise Linux 5.0 and 6.0, and Opensuse 12.2.
CVE-2012-2142 allows remote attackers to execute arbitrary commands by exploiting the escape sequence for a terminal emulator in a PDF.
To fix vulnerability CVE-2012-2142, it is recommended to update to poppler version 0.21.4 or apply the relevant security patches from the respective vendor.