[PLDSA 9-1] New xpdf packages fix integer overflow

Krzysiek Taraszka dzimi at pld.org.pl
Sat Jan 4 19:58:22 CET 2003


- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 9-1                        security at pld.org.pl
http://www.pld.org.pl/security/                          PLD Security Team
04 January 2003 			http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------

Package        : xpdf-1.01-5		
Vulnerability  : integer overflow
Problem-Type   : local and remote
PLD-specific   : no
CVE references : CAN-2002-1384

The pdftops filter in the Xpdf and CUPS packages contains an integer
overflow that can be exploited to gain the privileges of the target user
or in some cases the increased privileges of the 'lp' user if installed
setuid. There are multiple ways of exploiting this vulnerability.

The above problems have been fixed in version 1.01-6 for the
current stable distribution (ra).

We recommend that you upgrade your xpdf packages.

wget -c url
	will fetch the file for you
rpm -Uhv file(s)*.rpm
        will upgrade the referenced file.

If you are using "poldek" - the package manager, use the line as given below
for upgrade packages

poldek --update
        will update the internal database
poldek --upgrade 'xpdf*'
        will install corrected packages

If you are using "apt" - the package manager, use the line as given below
for upgrade packages

apt-get update
        will update the internal database
apt-get upgrade 'xpdf*'
        will install corrected packages

PLD Linux 1.0 alias ra
- --------------------

  Source archives:

ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/xpdf-1.01-6.src.rpm
       MD5 checksum: 2e1c7e311d43e128c83713d86de3db2b

  I386 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/xpdf-1.01-6.i386.rpm
       MD5 checksum: b7b39a26b92e2a9112e6e86cd5562b33


  I586 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/xpdf-1.01-6.i586.rpm
       MD5 checksum: 67d5a8475725f1181f0f4e199a3771c2


  I686 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/xpdf-1.01-6.i686.rpm
       MD5 checksum: e6ab4cea8121136efbdc34c5534eca15


  PowerPC Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/xpdf-1.01-6.ppc.rpm
       MD5 checksum: c6be9fd0fb771a1c21c6d102e333343e


-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.

For i386 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security



More information about the pld-security-announce mailing list