{"vuid":"VU#200132","idnumber":"200132","name":"Various UNIX and Linux PDF readers/viewers execute commands embedded within hyperlinks","keywords":["UNIX based PDF reader/viewer","arbitrary command execution","hyperlink","sh -c"],"overview":"A vulnerability in various UNIX and Linux PDF viewers/readers may allow remote attackers to execute arbitrary commands on your system.","clean_desc":"Adobe Systems Incorporated describes PDF (Portable Document Format) as \"a universal file format that preserves the fonts, images, graphics, and layout of any source document, regardless of the application and platform used to create it.\" A viewer such as Adobe Reader or Xpdf is needed to view a document encoded in PDF. Various PDF viewers are widely deployed on the Internet. Quoting from the Adobe Systems Incorporated web site: Governments and enterprises around the world have adopted PDF to streamline document management, increase productivity, and reduce reliance on paper....An open file format specification, PDF is available to anyone who wants to develop tools to create, view, or manipulate PDF documents. Indeed, more than 1,800 vendors offer PDF-based solutions, ensuring that organizations that adopt the PDF standard have a variety of tools to leverage the Portable Document Format and to customize document processes. When a victim clicks on a hyperlink contained within a malicious PDF file, an attacker may be able to execute arbitrary commands with the privileges of the victim. This is possible because some UNIX and Linux PDF readers/viewers spawn external programs to handle hyperlinks by invoking the shell command interpreter.","impact":"A remote attacker may be able to execute arbitrary commands with the privileges of the victim.","resolution":"Apply a patch when available.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Martyn Gilmore. The CERT/CC thanks Martyn, Adobe, and the folks responsible for the Xpdf project.","author":"This document was written by Ian A Finlay.","public":["http://www.adobe.com/products/acrobat/adobepdf.html","http://www.adobe.com/products/acrobat/readermain.html","http://www.foolabs.com/xpdf/about.html","http://www.secunia.com/advisories/9037/","http://www.secunia.com/advisories/9038/"],"cveids":["CVE-2003-0434"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-05-07T16:31:32Z","publicdate":"2003-06-13T00:00:00Z","datefirstpublished":"2003-06-18T20:55:30Z","dateupdated":"2003-09-26T15:44:02Z","revision":27,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"37.96875","cam_scorecurrentwidelyknown":"37.96875","cam_scorecurrentwidelyknownexploited":"63.28125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":37.96875,"vulnote":null}