Gentoo: acroread arbitrary code execution vulnerability
Summary
GENTOO LINUX SECURITY ANNOUNCEMENT 200306-12
from advisory: "Valid PDF files can contain malicious external-type hyperlinks that can execute arbitrary shell commands underneath Unix with various PDF viewers/readers.
The hyperlinks must be activated or followed for the malicious script to run. The obvious case is for a user to click on one. "
Read the full advisory at http://marc.theaimsgroup.com/?l=full-disclosure&m=105555332025253&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running app-text/acroread upgrade to acroread-5.07 as follows
emerge sync emerge acroread emerge clean
aliz@gentoo.org - GnuPG key is available at
Resolution
References
Availability
Concerns
Background