FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Okular -- Local binary execution via action links

Affected packages
okular < 19.12.3_3

Details

VuXML ID c3600a64-64ea-11ea-bdff-e0d55e2a8bf9
Discovery 2020-03-12
Entry 2020-03-13

Albert Astals Cid:

Okular can be tricked into executing local binaries via specially crafted PDF files.

This binary execution can require almost no user interaction.

No parameters can be passed to those local binaries.

We have not been able to identify any binary that will cause actual damage, be it in the hardware or software level, when run without parameters.

We remain relatively confident that for this issue to do any actual damage, it has to run a binary specially crafted. That binary must have been deployed to the user system via another method, be it the user downloading it directly as an email attachment, webpage download, etc. or by the system being already compromised.

References

URL https://kde.org/info/security/advisory-20200312-1.txt