From 227998b8976cc66d21ff730fe60cdbc141ec0c67 Mon Sep 17 00:00:00 2001 From: "Simon L. B. Nielsen" Date: Wed, 26 Jan 2005 20:25:46 +0000 Subject: [PATCH] Document "makeFileKey2()" buffer overflow vulnerability in xpdf (and programs embedding xpdf). --- security/vuxml/vuln.xml | 60 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 60 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0a0b07b49776..68511446238f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,66 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + xpdf -- makeFileKey2() buffer overflow vulnerability + + + xpdf + 3.00_6 + + + kdegraphics + 3.3.2_2 + + + gpdf + 0 + + + teTeX-base + 2.0.2_9 + + + cups-base + 0 + + + koffice + 1.3.5_2,1 + + + pdftohtml + 0 + + + + +

An iDEFENSE Security Advisory reports:

+
+

Remote exploitation of a buffer overflow vulnerability in + the xpdf PDF viewer included in multiple Unix and Linux + distributions could allow for arbitrary code execution as + the user viewing a PDF file.

+

The vulnerability specifically exists due to insufficient + bounds checking while processing a PDF file that provides + malicious values in the /Encrypt /Length tag. The + offending code can be found in the + Decrypt::makeFileKey2 function in the source + file xpdf/Decrypt.cc.

+
+ +
+ + CAN-2005-0064 + http://marc.theaimsgroup.com/?l=bugtraq&m=110608898221554 + http://www.koffice.org/security/advisory-20050120-1.txt + + + 2005-01-06 + 2005-01-26 + +
+ zhcon -- unauthorized file access