======================================================================
Secunia Research 29/06/2005
- Adobe Reader for Linux Insecure Temporary File Creation -
======================================================================
Table of Contents
Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10
======================================================================
1) Affected Software
Adobe Reader 5.0.10 for Linux.
NOTE: Other versions may also be affected.
======================================================================
2) Severity
Rating: Less critical
Impact: Exposure of sensitive information
Where: Local System
======================================================================
3) Vendor's Description of Software
"Adobe Reader is free software that allows everyone from business
professionals to home users to easily and reliably view, print, and
search PDF files using a variety of platforms and devices."
Product Link:
http://www.adobe.com/products/acrobat/readermain.html
======================================================================
4) Description of Vulnerability
Secunia has discovered a security issue in Adobe Reader for Linux,
which can be exploited by malicious, local users to gain knowledge
of sensitive information.
The problem is caused due to temporary files being created with
permissions based on a user's umask in the "/tmp" folder under
certain circumstances when documents are opened.
Example:
[test1@ts1 tmp]$ pwd
/tmp
[test1@ts1 tmp]$ ll A*
-rw-rw-r-- 1 test1 test1 2048000 Apr 5 12:10 Acro0waWth
-rw-rw-r-- 1 test3 test3 0 Apr 7 11:59 AcrodftfSw
-rw-rw-r-- 1 test1 test1 338 Apr 13 15:17 AcroDLk9ED
-rw-rw-r-- 1 test2 test2 2048000 Apr 13 15:18 AcroDVxpj7
-rw-rw-r-- 1 test2 test2 2048000 Apr 8 12:13 AcrojCjK46
-rw-rw-r-- 1 test3 test3 2048000 Apr 14 12:51 AcrolXvRGr
-rw-rw-r-- 1 test1 test1 2048000 Apr 12 13:20 AcroMRcjtB
Successful exploitation allows an unprivileged user to read arbitrary
users' documents.
======================================================================
5) Solution
Update to version 7.0 or later for Linux.
======================================================================
6) Time Table
11/05/2005 - Vendor notified.
11/05/2005 - Vendor response.
21/06/2005 - Vendor final response.
29/06/2005 - Public disclosure.
======================================================================
7) Credits
Discovered by Carsten Eiram, Secunia Research.
======================================================================
8) References
The Common Vulnerabilities and Exposures (CVE) project has assigned
candidate number CAN-2005-1912 for the vulnerability.
======================================================================
9) About Secunia
Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:
http://secunia.com/
Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.
Secunia offers a FREE mailing list called Secunia Security Advisories:
http://secunia.com/secunia_security_advisories/
======================================================================
10) Verification
Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-6/
Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/
======================================================================
|