GLSA Bodhisattva
Joined: 25 Feb 2003 Posts: 3829 Location: Essen, Germany
|
Posted: Sat Jan 22, 2005 7:48 am Post subject: [ GLSA 200501-28 ] Xpdf, GPdf: Stack overflow in Decrypt::ma |
|
|
Gentoo Linux Security Advisory
Title: Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2 (GLSA 200501-28)
Severity: normal
Exploitable: remote
Date: January 21, 2005
Bug(s): #77888, #78128
ID: 200501-28
Synopsis
A stack overflow was discovered in Xpdf, potentially resulting in the execution of arbitrary code. GPdf includes Xpdf code and therefore is vulnerable to the same issue.
Background
Xpdf is an open source viewer for Portable Document Format (PDF) files. GPdf is a Gnome-based PDF viewer that includes some Xpdf code.
Affected Packages
Package: app-text/xpdf
Vulnerable: <= 3.00-r7
Unaffected: >= 3.00-r8
Architectures: All supported architectures
Package: app-text/gpdf
Vulnerable: < 2.8.2
Unaffected: >= 2.8.2
Architectures: All supported architectures
Description
iDEFENSE reports that the Decrypt::makeFileKey2 function in Xpdf's Decrypt.cc insufficiently checks boundaries when processing /Encrypt /Length tags in PDF files.
Impact
An attacker could entice an user to open a specially-crafted PDF file which would trigger a stack overflow, potentially resulting in execution of arbitrary code with the rights of the user running Xpdf or GPdf.
Workaround
There is no known workaround at this time.
Resolution
All Xpdf users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r8" | All GPdf users should also upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/gpdf-2.8.2" |
References
CAN-2005-0064
iDEFENSE Advisory
Last edited by GLSA on Sun May 07, 2006 4:54 pm; edited 1 time in total |
|