---

Caldera Systems Security Advisory: Security problems in xpdf

Date: Mon, 11 Sep 2000 12:12:20 -0600
From: Technical Support support@PHOENIX.CALDERASYSTEMS.COM

To: BUGTRAQ@SECURITYFOCUS.COM
Subject: Security Update: Security problems in xpdf


                   Caldera Systems, Inc.  Security Advisory

Subject:                Security problems in xpdf
Advisory number:        CSSA-2000-031.0
Issue date:             2000 September, 11
Cross reference:

1. Problem Description

There are two security problems in xpdf, the PDF file viewer.
The first is that temporary files were created insecurely.

The second problem is that xpdf was not cautious enough when the
user clicked on a URL. Xpdf would start the URL viewer (netscape by
default) via the system shell, not properly taking care of shell
meta characters. This problem could be exploited by creating PDF
files that ran malicious code when the user selected a URL in the
document.

2. Vulnerable Versions

   System                       Package

   OpenLinux Desktop 2.3        All packages previous to
                                xpdf-0.91-3

   OpenLinux eServer 2.3        All packages previous to
   and OpenLinux eBuilder       xpdf-0.91-3

   OpenLinux eDesktop 2.4       All packages previous to
                                xpdf-0.91-3

3. Solution

Workaround:

None known.

4. OpenLinux Desktop 2.3

4.1 Location of Fixed Packages

The upgrade packages can be found on Caldera’s FTP site at:


ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/

The corresponding source code package can be found at:


ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS

4.2 Verification

6582e3df8c2e677d4a7a0208322893eb RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm

4.3 Installing Fixed Packages

Upgrade the affected packages with the following commands:

rpm -Fhv xpdf-0.91-3.i386.rpm

5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential
3.0

5.1 Location of Fixed Packages

The upgrade packages can be found on Caldera’s FTP site at:


ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/

The corresponding source code package can be found at:


ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS

5.2 Verification

f0cf08c9febe6c7e16500812a140f846 RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm

5.3 Installing Fixed Packages

Upgrade the affected packages with the following commands:

rpm -Fhv xpdf-0.91-3.i386.rpm

6. OpenLinux eDesktop 2.4

6.1 Location of Fixed Packages

The upgrade packages can be found on Caldera’s FTP site at:


ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/

The corresponding source code package can be found at:


ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS

6.2 Verification

696e6851ecd8b348a9b4c0ef18fd94bd RPMS/xpdf-0.91-3.i386.rpm
cdeff2eb8b34c433fa4e35ae08766c37 SRPMS/xpdf-0.91-3.src.rpm

6.3 Installing Fixed Packages

Upgrade the affected packages with the following commands:

rpm -Fhv xpdf-0.91-3.i386.rpm

7. References

This and other Caldera security resources are located at:

http://www.calderasystems.com/support/security/index.html

This security fix closes Caldera’s internal Problem Report
7686.

8. Disclaimer

Caldera Systems, Inc. is not responsible for the misuse of any
of the information we provide on this website and/or through our
security advisories. Our advisories are a service to our customers
intended to promote secure installation and use of Caldera
OpenLinux.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis