[Full-Disclosure] [ GLSA 200408-14 ] acroread: UUDecode filename buffer overflow

From: Sune Kloppenborg Jeppesen (jaervosz_at_gentoo.org)
Date: 08/15/04

  • Next message: Ill will: "Re: [Full-Disclosure] ws_ftp.log"
    To: gentoo-announce@gentoo.org
    Date: Sun, 15 Aug 2004 16:47:49 +0200
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 200408-14
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                                http://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Severity: Normal
         Title: acroread: UUDecode filename buffer overflow
          Date: August 15, 2004
          Bugs: #60205
            ID: 200408-14

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    acroread contains two errors in the handling of UUEncoded filenames
    that may lead to execution of arbitrary code or programs.

    Background
    ==========

    acroread is Adobe's Acrobat PDF reader for Linux.

    Affected packages
    =================

        -------------------------------------------------------------------
         Package / Vulnerable / Unaffected
        -------------------------------------------------------------------
      1 app-text/acroread <= 5.08 >= 5.09

    Description
    ===========

    acroread contains two errors in the handling of UUEncoded filenames.
    First, it fails to check the length of a filename before copying it
    into a fixed size buffer and, secondly, it fails to check for the
    backtick shell metacharacter in the filename before executing a command
    with a shell.

    Impact
    ======

    By enticing a user to open a PDF with a specially crafted filename, an
    attacker could execute arbitrary code or programs with the permissions
    of the user running acroread.

    Workaround
    ==========

    There is no known workaround at this time. All users are encouraged to
    upgrade to the latest available version of acroread.

    Resolution
    ==========

    All acroread users should upgrade to the latest version:

        # emerge sync

        # emerge -pv ">=app-text/acroread-5.09"
        # emerge ">=app-text/acroread-5.09"

    References
    ==========

      [ 1 ] iDEFENSE Advisory 125
            http://idefense.com/application/poi/display?id=125&type=vulnerabilities
      [ 2 ] iDEFENSE Advisory 126
            http://idefense.com/application/poi/display?id=126&type=vulnerabilities

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

        http://security.gentoo.org/glsa/glsa-200408-14.xml

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users machines is of utmost
    importance to us. Any security concerns should be addressed to
    security@gentoo.org or alternatively, you may file a bug at
    http://bugs.gentoo.org.

    License
    =======

    Copyright 2004 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    http://creativecommons.org/licenses/by-sa/1.0
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.4 (GNU/Linux)

    iD8DBQFBH3efzKC5hMHO6rkRAqOrAJ9AvnKDxSb+Wwx9PDE1PrMdRJPR2gCgi8Eg
    IqibOXjRcG0lw4PJhSUSC3E=
    =xfgU
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Ill will: "Re: [Full-Disclosure] ws_ftp.log"

    Relevant Pages

    • [ GLSA 200408-14 ] acroread: UUDecode filename buffer overflow
      ... that may lead to execution of arbitrary code or programs. ... acroread is Adobe's Acrobat PDF reader for Linux. ... it fails to check the length of a filename before copying it ... Security is a primary focus of Gentoo Linux and ensuring the ...
      (Bugtraq)
    • [ GLSA 200408-14 ] acroread: UUDecode filename buffer overflow
      ... that may lead to execution of arbitrary code or programs. ... acroread is Adobe's Acrobat PDF reader for Linux. ... it fails to check the length of a filename before copying it ... Security is a primary focus of Gentoo Linux and ensuring the ...
      (Full-Disclosure)
    • [UNIX] GV Execution of Arbitrary Shell Commands (Additional details)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... which is a PostScript and PDF language interpreter. ... Unfortunately, these commands contain the filename, which can be ... that causes execution of arbitrary shell commands when it is read with GV. ...
      (Securiteam)
    • Re: [SLE] security, Acrobat Reader 5.0.9
      ... >updates and SUSE Security Announcements don't mention it as a pending ... joe@jmorris:~> rpm -q --changelog acroread ...
      (SuSE)