Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 345565 - app-text/xpdf: Denial of Service and Arbitrary Code Execution Vulnerabilities (CVE-2010-{3702,3704})
Summary: app-text/xpdf: Denial of Service and Arbitrary Code Execution Vulnerabilities...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3...
Whiteboard: B2 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-11-15 04:56 UTC by Tim Sammut (RETIRED)
Modified: 2011-01-03 03:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2010-11-15 04:56:24 UTC
From the NVD:

CVE-2010-3702: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference. 

CVE-2010-3704:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption. 

Upstream has released 3.02pl5, ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch.
Comment 1 Alexis Ballier gentoo-dev 2010-12-28 20:41:57 UTC
not for us afaik as we use poppler for xpdf
Comment 2 Tim Sammut (RETIRED) gentoo-dev 2011-01-02 05:44:51 UTC
(In reply to comment #1)
> not for us afaik as we use poppler for xpdf
> 

Please excuse my ignorance; do you mean that app-text/xpdf does not use xpdf originated from foolabs.com at all? Thanks.
Comment 3 Alexis Ballier gentoo-dev 2011-01-02 12:05:50 UTC
(In reply to comment #2)
> (In reply to comment #1)
> > not for us afaik as we use poppler for xpdf
> > 
> 
> Please excuse my ignorance; do you mean that app-text/xpdf does not use xpdf
> originated from foolabs.com at all? Thanks.

It does, but only part of it. The code affected by these sec. issues is, afaik, removed from our xpdf and taken from poppler.
Comment 4 Tim Sammut (RETIRED) gentoo-dev 2011-01-03 03:39:55 UTC
(In reply to comment #3)
> 
> It does, but only part of it. The code affected by these sec. issues is, afaik,
> removed from our xpdf and taken from poppler.
> 

Ok, thank you. Looks like poppler was fixed via bug 338878. I am going to go ahead and close this as invalid. Please do reopen if we need to do something here to correct this issue in our xpdf.