[XPDF] possible buffer overflow and execution of arbitrary code
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cups-pdf (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
gpdf (Ubuntu) |
Won't Fix
|
Undecided
|
Unassigned | ||
kdegraphics (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
koffice (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
poppler (Ubuntu) |
Fix Released
|
High
|
Kees Cook | ||
xpdf (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Affects:
xpdf, kpdf, kword, cups, gpdf, poppler
Quoting http://
"The KDE developers have published a security advisory concerning a vulnerability when processing crafted PDFs. Opening one of these files with XPDF, kpdf, KOffice or any other software which has adopted the source code from XPDF can cause a buffer overflow and execution of an arbitrary program code.
The bug stems from an integer overflow in the function StreamPredictor
Other applications which use the faulty code from XPDF also contain the vulnerability. Red Hat has now also released software updates for CUPS, gpdf and poppler which close the hole. The other Linux distributors are also soon to release up-dated packages, which users should install as soon as they can."
References:
- kpdf/kword/xpdf stack based buffer overflow, security advisory from KDE developers:
http://
- cups security update, bug report from Red Hat:
http://
- gpdf security update, bug report from Red Hat:
http://
- poppler security update, bug report from Red Hat:
http://
CVE References
Changed in xpdf: | |
status: | Confirmed → Fix Released |
KOffice update is being published right now (USN-496-1).