The rasterization process in Inkscape before 0.48.4 allows local users to read arbitrary files via an external entity in a SVG file, aka an XML external entity (XXE) injection attack.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/12/20/3 | mailing list exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095380.html | mailing list vendor advisory |
http://bazaar.launchpad.net/~inkscape.dev/inkscape/trunk/revision/11931 | patch |
http://www.ubuntu.com/usn/USN-1712-1 | third party advisory vendor advisory |
https://launchpad.net/inkscape/+milestone/0.48.4 | product |
http://www.securityfocus.com/bid/56965 | vdb entry third party advisory broken link |
https://bugs.launchpad.net/inkscape/+bug/1025185 | issue tracking exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095398.html | mailing list vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-02/msg00041.html | mailing list vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-02/msg00043.html | mailing list vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-December/095024.html | mailing list vendor advisory |