First published: Mon Feb 13 2012(Updated: )
An insufficient escape sequences sanitization flaw was found in the way xpdf, a PDF file viewer for the X window system, and poppler, a PDF rendering library, performed sanitization of certain characters to be displayed in the error messages, which arose during presentation of certain PDF files. A remote attacker could use this flaw to modify a window's title, or, possibly execute arbitrary commands or overwrite files, via a specially-crafted PDF file containing an escape sequence for a terminal emulator if local, unsuspecting user opened such crafted PDF file in xpdf or in an application linked against poppler library (for example evince).
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf | ||
Poppler Poppler |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-789936 is considered moderate due to potential impacts on error message display.
To fix REDHAT-BUG-789936, it is recommended to update xpdf and poppler to the latest patched versions.
REDHAT-BUG-789936 affects xpdf, a PDF viewer, and poppler, a PDF rendering library.
REDHAT-BUG-789936 is classified as an insufficient sanitization flaw regarding error messages.
Currently, the best approach for REDHAT-BUG-789936 is to update the affected software to avoid potential exploitation.