First published: Wed Jan 29 2014(Updated: )
The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-common before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/logilab-common | <0.61.0 | 0.61.0 |
debian/logilab-common | 1.8.1-1 1.9.8-1 2.0.0-1 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Logilab Common | <=0.60.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1838 has a medium severity due to the potential for local users to exploit the symlink vulnerability and overwrite arbitrary files.
To remediate CVE-2014-1838, update logilab-common to version 0.61.0 or later if using pip, or to specific versions for Debian as mentioned in the advisory.
All versions of logilab-common prior to 0.61.0 and up to 0.60.0 are vulnerable to CVE-2014-1838.
No, CVE-2014-1838 is a local vulnerability that requires local user access to exploit.
CVE-2014-1838 can allow local users to overwrite arbitrary files, potentially leading to unauthorized access or data loss.