Secunia Security Advisory - Brian May has reported a vulnerability in pstotext, which potentially can be exploited by malicious people to compromise a vulnerable system.
598874f624f81b7f5cace98b5caed36fd5ac49b4c8cd57de496ed8bf1c8ab528
TITLE:
pstotext Filename Shell Command Injection Vulnerability
SECUNIA ADVISORY ID:
SA20012
VERIFY ADVISORY:
http://secunia.com/advisories/20012/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
pstotext 1.x
http://secunia.com/product/5431/
DESCRIPTION:
Brian May has reported a vulnerability in pstotext, which potentially
can be exploited by malicious people to compromise a vulnerable
system.
The vulnerability is caused due to an error in sanitising the
filename supplied via the command line. This can be exploited to
execute arbitrary commands when pstotext is run with a specially
crafted command line that contains shell commands.
Successful exploitation requires that pstotext is run with command
line input from non-trusted sources e.g. via a CGI application.
The vulnerability has been reported in version 1.9. Other versions
may also be affected.
SOLUTION:
Sanitise user supplied filenames before passing them as command line
arguments to pstotext.
PROVIDED AND/OR DISCOVERED BY:
Brian May
ORIGINAL ADVISORY:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356988
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------