Vulnerability Description
The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 12.3 |
| Logilab | Logilab-Common | <= 0.60.0 |
Related Weaknesses (CWE)
References
- http://comments.gmane.org/gmane.comp.security.oss.general/11986
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html
- http://secunia.com/advisories/57209
- http://www.logilab.org/ticket/207561
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051
- http://comments.gmane.org/gmane.comp.security.oss.general/11986
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html
- http://secunia.com/advisories/57209
- http://www.logilab.org/ticket/207561
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051
FAQ
What is CVE-2014-1838?
CVE-2014-1838 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a...
How severe is CVE-2014-1838?
CVE-2014-1838 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1838?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Logilab Logilab-Common.