An insufficient escape sequences sanitization flaw was found in the way xpdf, a PDF file viewer for the X window system, and poppler, a PDF rendering library, performed sanitization of certain characters to be displayed in the error messages, which arose during presentation of certain PDF files. A remote attacker could use this flaw to modify a window's title, or, possibly execute arbitrary commands or overwrite files, via a specially-crafted PDF file containing an escape sequence for a terminal emulator if local, unsuspecting user opened such crafted PDF file in xpdf or in an application linked against poppler library (for example evince).
This issue affects the versions of the poppler package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the poppler package, as shipped with Fedora release of 18 and 19. -- This issue affects the versions of the xpdf package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. -- This issue affects the versions of the poppler package, as shipped with Fedora release of 18 and 19.
The CVE identifier of CVE-2012-2142 has been assigned to this issue.
Acknowledgements: Red Hat would like to thank Phillips Wolf for reporting this issue.
Created attachment 784759 [details] Proposed poppler patch by Marek Kasik (against upstream poppler version)
Created poppler tracking bugs for this issue: Affects: fedora-all [bug 995400]
Created xpdf tracking bugs for this issue: Affects: fedora-all [bug 995401] Affects: epel-all [bug 995402]
Relevant poppler Git repository patch: http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40
(In reply to Jan Lieskovsky from comment #28) > Relevant poppler Git repository patch: > > http://cgit.freedesktop.org/poppler/poppler/commit/ > ?id=71bad47ed6a36d825b0d08992c8db56845c71e40 Poppler patch modified against xpdf-3.0.3: (from http://www.openwall.com/lists/oss-security/2013/08/11/1): http://sourceforge.net/projects/miscellaneouspa/files/misc/xpdf-3.03-CVE-2012-2142.diff
poppler-0.20.2-16.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
xpdf-3.03-8.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
xpdf-3.03-8.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
xpdf-3.03-8.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
xpdf-3.03-8.el5.1 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
xpdf-3.03-8.el6.1 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2012-2142