Summary: | app-text/poppler < 0.12.1 OR app-text/xpdf < 3.02pl4: Xpdf Multiple Integer Overflow Vulnerabilities (CVE-2009-{3603,3604,3606,3607,3608,3609}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Dawoud <d.s.j.birch> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | asolokha, esigra, pacho, yngwin |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 290464, 290470 | ||
Bug Blocks: |
Description
Dawoud
2009-10-25 07:34:56 UTC
CVE-2009-3603 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603): Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188. CVE-2009-3604 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604): The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow. CVE-2009-3606 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606): Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. CVE-2009-3607 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607): Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. CVE-2009-3608 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608): Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. CVE-2009-3609 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609): Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read. Poppler 0.12.2 released on November 18th, 2009. It fixes at least CVE-2009-3607. Please let me now if I should file separate bug (enhancement, because it's version bump request, after all) on it. I committed 0.12.3. Does that fix all remaining issues? poppler < 0.12.1 is already long gone from the tree not sure about our xpdf patchlevel but I just masked it and sent out the lastriting e-mail ("unmaintainable mess, no real maintainer"). (In reply to comment #4) > poppler < 0.12.1 is already long gone from the tree > > not sure about our xpdf patchlevel but I just masked it and sent out the > lastriting e-mail ("unmaintainable mess, no real maintainer"). And now xpdf is also gone from the portage tree. Will anyone still read this GLSA if it ever comes out? Come on, stable is poppler-0.20 by now. This issue was resolved and addressed in GLSA 201310-03 at http://security.gentoo.org/glsa/glsa-201310-03.xml by GLSA coordinator Sean Amoss (ackle). |