COMMAND
xpdf
SYSTEMS AFFECTED
xpdf, xpdf-i
PROBLEM
There is a potential race condation when using tmpnam() and
fopen() in xpdf versions prior to 0.91. This exploit can be only
used as root to overwrite arbitrary files if a symlink is created
between the calls to tmpname() and fopen(). There is also a
problem with malicious URL-type links in PDF documents that
contain quote characters which could also potentially be used to
execute arbitrary commands. This is due to xpdf calling system()
with a netscape (or similar) command plus the URL. The 0.91
release of xpdf fixes both of these potential problems. Although
there are no known exploits, users are encouraged to upgrade
their system with these updates.
SOLUTION
Patches for Linux Mandrake:
Linux-Mandrake 6.0: 6.0/RPMS/xpdf-0.91-4mdk.i586.rpm
6.0/SRPMS/xpdf-0.91-4mdk.src.rpm
Linux-Mandrake 6.1: 6.1/RPMS/xpdf-0.91-4mdk.i586.rpm
6.1/SRPMS/xpdf-0.91-4mdk.src.rpm
Linux-Mandrake 7.0: 7.0/RPMS/xpdf-0.91-4mdk.i586.rpm
7.0/SRPMS/xpdf-0.91-4mdk.src.rpm
For Debian:
http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90-7.diff.gz
http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90-7.dsc
http://security.debian.org/dists/stable/updates/main/source/xpdf_0.90.orig.tar.gz
http://security.debian.org/dists/stable/updates/main/binary-alpha/xpdf_0.90-7_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/xpdf_0.90-7_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/xpdf_0.90-7_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xpdf_0.90-7_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-sparc/xpdf_0.90-7_sparc.deb
For Caldera Linux:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/xpdf-0.91-3.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS/xpdf-0.91-3.src.rpm
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/xpdf-0.91-3.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS/xpdf-0.91-3.src.rpm
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/xpdf-0.91-3.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS/xpdf-0.91-3.src.rpm
For RedHat:
ftp://updates.redhat.com/5.2/sparc/xpdf-0.91-1.5x.sparc.rpm
ftp://updates.redhat.com/5.2/alpha/xpdf-0.91-1.5x.alpha.rpm
ftp://updates.redhat.com/5.2/i386/xpdf-0.91-1.5x.i386.rpm
ftp://updates.redhat.com/5.2/SRPMS/xpdf-0.91-1.5x.src.rpm
ftp://updates.redhat.com/6.2/sparc/xpdf-0.91-1.6x.sparc.rpm
ftp://updates.redhat.com/6.2/alpha/xpdf-0.91-1.6x.alpha.rpm
ftp://updates.redhat.com/6.2/i386/xpdf-0.91-1.6x.i386.rpm
ftp://updates.redhat.com/6.2/SRPMS/xpdf-0.91-1.6x.src.rpm
For Conectiva Linux:
ftp://atualizacoes.conectiva.com.br/4.0es/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.1/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.2/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/xpdf-0.91-1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/SRPMS/xpdf-0.91-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/xpdf-0.91-1cl.i386.rpm
For FreeBSD:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/graphics/xpdf-0.91.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/graphics/xpdf-0.91.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/graphics/xpdf-0.91.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/graphics/xpdf-0.91.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/graphics/xpdf-0.91.tgz
xpdf-i < 0.90-7 is vulnerable, too. But now is fixed.