SB2013011805 - Multiple vulnerabilities in inkscape
Published: January 18, 2013 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-6076)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-5656)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The rasterization process in Inkscape before 0.48.4 allows local users to read arbitrary files via an external entity in a SVG file, aka an XML external entity (XXE) injection attack.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00041.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00043.html
- http://www.openwall.com/lists/oss-security/2012/12/30/2
- http://www.ubuntu.com/usn/USN-1712-1
- https://bugs.launchpad.net/inkscape/+bug/911146
- http://bazaar.launchpad.net/~inkscape.dev/inkscape/trunk/revision/11931
- http://lists.fedoraproject.org/pipermail/package-announce/2012-December/095024.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095380.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095398.html
- http://www.openwall.com/lists/oss-security/2012/12/20/3
- http://www.securityfocus.com/bid/56965
- https://bugs.launchpad.net/inkscape/+bug/1025185
- https://launchpad.net/inkscape/+milestone/0.48.4