Document "makeFileKey2()" buffer overflow vulnerability in xpdf (and
programs embedding xpdf).
This commit is contained in:
parent
f42f9e91fd
commit
227998b897
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=127451
@ -32,6 +32,66 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="f755545e-6fcd-11d9-abec-00061bd2d56f">
|
||||
<topic>xpdf -- makeFileKey2() buffer overflow vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>xpdf</name>
|
||||
<range><lt>3.00_6</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>kdegraphics</name>
|
||||
<range><lt>3.3.2_2</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>gpdf</name>
|
||||
<range><gt>0</gt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>teTeX-base</name>
|
||||
<range><lt>2.0.2_9</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>cups-base</name>
|
||||
<range><gt>0</gt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>koffice</name>
|
||||
<range><lt>1.3.5_2,1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>pdftohtml</name>
|
||||
<range><gt>0</gt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>An iDEFENSE Security Advisory reports:</p>
|
||||
<blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=110608898221554">
|
||||
<p>Remote exploitation of a buffer overflow vulnerability in
|
||||
the xpdf PDF viewer included in multiple Unix and Linux
|
||||
distributions could allow for arbitrary code execution as
|
||||
the user viewing a PDF file.</p>
|
||||
<p>The vulnerability specifically exists due to insufficient
|
||||
bounds checking while processing a PDF file that provides
|
||||
malicious values in the /Encrypt /Length tag. The
|
||||
offending code can be found in the
|
||||
<code>Decrypt::makeFileKey2</code> function in the source
|
||||
file xpdf/Decrypt.cc.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CAN-2005-0064</cvename>
|
||||
<mlist msgid="FB24803D1DF2A34FA59FC157B77C970503C8B298@idserv04.idef.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110608898221554</mlist>
|
||||
<url>http://www.koffice.org/security/advisory-20050120-1.txt</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2005-01-06</discovery>
|
||||
<entry>2005-01-26</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="d371b627-6ed5-11d9-bd18-000a95bc6fae">
|
||||
<topic>zhcon -- unauthorized file access</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user