Untrusted search path vulnerability in the Gentoo package of Xpdf before 3.02-r2 allows local users to gain privileges via a Trojan horse xpdfrc file in the current working directory, related to an unset SYSTEM_XPDFRC macro in a Gentoo build process that uses the poppler library.
References
Link | Resource |
---|---|
http://security.gentoo.org/glsa/glsa-200904-07.xml | |
http://bugs.gentoo.org/show_bug.cgi?id=200023 | Vendor Advisory |
http://www.securityfocus.com/bid/34401 | |
http://bugs.gentoo.org/show_bug.cgi?id=242930 | Vendor Advisory |
http://secunia.com/advisories/34610 | Vendor Advisory |
http://osvdb.org/53529 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2009-04-09 08:08
Updated : 2019-03-06 08:30
NVD link : CVE-2009-1144
Mitre link : CVE-2009-1144
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
glyphandcog
- xpdfreader
foolabs
- xpdf
gentoo
- gentoo_linux