raptor2 vulnerability

Related Vulnerabilities: CVE-2012-0037  

Applications using Raptor could be made to expose sensitive information or run programs as your login if they opened a specially crafted file.

Timothy D. Morgan discovered that Raptor would unconditionally load XML external entities. If a user were tricked into opening a specially crafted document in an application linked against Raptor, an attacker could possibly obtain access to arbitrary files on the user’s system or potentially execute arbitrary code with the privileges of the user invoking the program.

8 July 2013

raptor2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS

Summary

Applications using Raptor could be made to expose sensitive information or run programs as your login if they opened a specially crafted file.

Software Description

  • raptor2 - Raptor 2 RDF syntax library

Details

Timothy D. Morgan discovered that Raptor would unconditionally load XML external entities. If a user were tricked into opening a specially crafted document in an application linked against Raptor, an attacker could possibly obtain access to arbitrary files on the user’s system or potentially execute arbitrary code with the privileges of the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 LTS
libraptor2-0 - 2.0.6-1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications which use Raptor, such as LibreOffice, to make all the necessary changes.

References