Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200601-02 ] KPdf, KWord: Multiple overflows in included Xpdf code
Date: Thu, 05 Jan 2006 07:04:19
Message-Id: 200601042302.36925.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200601-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: KPdf, KWord: Multiple overflows in included Xpdf code
9 Date: January 04, 2006
10 Bugs: #114429, #115851
11 ID: 200601-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
19 making them vulnerable to the execution of arbitrary code.
20
21 Background
22 ==========
23
24 KPdf is a KDE-based PDF viewer included in the kdegraphics package.
25 KWord is a KDE-based word processor also included in the koffice
26 package.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 kde-base/kdegraphics < 3.4.3-r3 >= 3.4.3-r3
35 2 kde-base/kpdf < 3.4.3-r3 >= 3.4.3-r3
36 3 app-office/koffice < 1.4.2-r6 >= 1.4.2-r6
37 4 app-office/kword < 1.4.2-r6 >= 1.4.2-r6
38 -------------------------------------------------------------------
39 4 affected packages on all of their supported architectures.
40 -------------------------------------------------------------------
41
42 Description
43 ===========
44
45 KPdf and KWord both include Xpdf code to handle PDF files. This Xpdf
46 code is vulnerable to several heap overflows (GLSA 200512-08) as well
47 as several buffer and integer overflows discovered by Chris Evans.
48
49 Impact
50 ======
51
52 An attacker could entice a user to open a specially crafted PDF file
53 with Kpdf or KWord, potentially resulting in the execution of arbitrary
54 code with the rights of the user running the affected application.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All kdegraphics users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r3"
68
69 All Kpdf users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r3"
73
74 All KOffice users should upgrade to the latest version:
75
76 # emerge --sync
77 # emerge --ask --oneshot --verbose ">=app-office/koffice-1.4.2-r6"
78
79 All KWord users should upgrade to the latest version:
80
81 # emerge --sync
82 # emerge --ask --oneshot --verbose ">=app-office/kword-1.4.2-r6"
83
84 References
85 ==========
86
87 [ 1 ] CAN-2005-3191
88 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191
89 [ 2 ] CAN-2005-3192
90 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192
91 [ 3 ] CAN-2005-3193
92 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193
93 [ 4 ] CVE-2005-3624
94 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
95 [ 5 ] CVE-2005-3625
96 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
97 [ 6 ] CVE-2005-3626
98 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
99 [ 7 ] CVE-2005-3627
100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
101 [ 8 ] GLSA 200512-08
102 http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
103 [ 9 ] KDE Security Advisory: kpdf/xpdf multiple integer overflows
104 http://www.kde.org/info/security/advisory-20051207-2.txt
105
106 Availability
107 ============
108
109 This GLSA and any updates to it are available for viewing at
110 the Gentoo Security Website:
111
112 http://security.gentoo.org/glsa/glsa-200601-02.xml
113
114 Concerns?
115 =========
116
117 Security is a primary focus of Gentoo Linux and ensuring the
118 confidentiality and security of our users machines is of utmost
119 importance to us. Any security concerns should be addressed to
120 security@g.o or alternatively, you may file a bug at
121 http://bugs.gentoo.org.
122
123 License
124 =======
125
126 Copyright 2006 Gentoo Foundation, Inc; referenced text
127 belongs to its owner(s).
128
129 The contents of this document are licensed under the
130 Creative Commons - Attribution / Share Alike license.
131
132 http://creativecommons.org/licenses/by-sa/2.0