CVE-2003-0434 : Détail

CVE-2003-0434

24.6%V3
Network
2003-06-18
02h00 +00:00
2017-10-09
22h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 22771

Date de publication : 2003-06-12 22h00 +00:00
Auteur : Martyn Gilmore
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/7912/info A vulnerability has been reported for multiple PDF viewers for Unix variant operating systems. The problem is said to occur when hyperlinks have been enabled within the viewer. Allegedly, by placing a specially formatted hyperlink within a PDF file it is possible to execute arbitrary shell commands when a user clicks the link. This is due to the PDF viewer invoking an external application, via a call to 'sh -c', to handle the request. Successful exploitation of this vulnerability could potentially allow an attacker to execute arbitrary commands on a target system with the privileges of the user invoking the PDF document. It should be noted that this vulnerability may be similar to that described in BID 1624. ** Reports suggest that the fixes supplied by Red Hat and Mandrake Linux do not adequately fix the problem. Specifically, the fixes make changes to xpdf to filter out back quote characters. The problem lies in the fact that other shell metacharacters are not filtered. Thus it may still be possible for attackers to execute arbitrary commands. Red Hat has released updated advisories to correct this oversight. \documentclass[11pt]{minimal} \usepackage{color} \usepackage[urlcolor=blue,colorlinks=true,pdfpagemode=none]{hyperref} \begin{document} \href{prot:hyperlink with stuff, say, `rm -rf /tmp/abc`; touch /tmp/pqr}{\textt\t{Click me}} \end{document}

Products Mentioned

Configuraton 0

Adobe>>Acrobat >> Version 5.0.6

Xpdf>>Xpdf >> Version 1.1

    Configuraton 0

    Mandrakesoft>>Mandrake_linux >> Version 9.0

    Mandrakesoft>>Mandrake_linux >> Version 9.1

    Mandrakesoft>>Mandrake_linux_corporate_server >> Version 2.1

    Redhat>>Enterprise_linux >> Version 2.1

      Redhat>>Enterprise_linux >> Version 2.1

        Redhat>>Enterprise_linux >> Version 2.1

          Redhat>>Linux >> Version 7.1

          Redhat>>Linux >> Version 7.2

          Redhat>>Linux >> Version 7.3

          Redhat>>Linux >> Version 8.0

          Redhat>>Linux >> Version 9.0

          Redhat>>Linux_advanced_workstation >> Version 2.1

            Références

            http://secunia.com/advisories/9038
            Tags : third-party-advisory, x_refsource_SECUNIA
            http://www.mandriva.com/security/advisories?name=MDKSA-2003:071
            Tags : vendor-advisory, x_refsource_MANDRAKE
            http://www.kb.cert.org/vuls/id/200132
            Tags : third-party-advisory, x_refsource_CERT-VN
            http://www.redhat.com/support/errata/RHSA-2003-196.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://secunia.com/advisories/9037
            Tags : third-party-advisory, x_refsource_SECUNIA
            http://www.redhat.com/support/errata/RHSA-2003-197.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://marc.info/?l=bugtraq&m=105777963019186&w=2
            Tags : mailing-list, x_refsource_BUGTRAQ