RedHat: Important: xpdf security update

    Date15 Feb 2005
    CategoryRed Hat
    5258
    Posted ByJoe Shakespeare
    An updated xpdf package that fixes several security issues is now available. This update has been rated as having important security impact by the Red Hat Security Response Team.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Important: xpdf security update
    Advisory ID:       RHSA-2005:034-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-034.html
    Issue date:        2005-02-15
    Updated on:        2005-02-15
    Product:           Red Hat Enterprise Linux
    CVE Names:         CAN-2004-1125 CAN-2005-0064 CAN-2005-0206
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    An updated xpdf package that fixes several security issues is now available.
    
    This update has been rated as having important security impact by the Red Hat
    Security Response Team.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
    Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
    Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
    Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
    
    3. Problem description:
    
    Xpdf is an X Window System based viewer for Portable Document Format (PDF)
    files.
    
    A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An
    attacker could construct a carefully crafted PDF file that could cause Xpdf
    to crash or possibly execute arbitrary code when opened. The Common
    Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
    CAN-2004-1125 to this issue.
    
    A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
    Xpdf. An attacker could construct a carefully crafted PDF file that could
    cause Xpdf to crash or possibly execute arbitrary code when opened. The
    Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
    the name CAN-2005-0064 to this issue.
    
    During a source code audit, Chris Evans and others discovered a number of
    integer overflow bugs that affected all versions of Xpdf. An attacker could
    construct a carefully crafted PDF file that could cause Xpdf to crash or
    possibly execute arbitrary code when opened. This issue was assigned the
    name CAN-2004-0888 by The Common Vulnerabilities and Exposures project
    (cve.mitre.org).  Red Hat Enterprise Linux 4 contained a fix for this
    issue, but it was found to be incomplete and left 64-bit architectures
    vulnerable.  The Common Vulnerabilities and Exposures project
    (cve.mitre.org) has assigned the name CAN-2005-0206 to this issue.
    
    All users of Xpdf should upgrade to this updated package, which contains
    backported patches to resolve these issues.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    135066 - PDF is displayed garbled, older xpdf works
    144197 - CAN-2004-1125 xpdf buffer overflow
    145052 - CAN-2005-0064 xpdf buffer overflow
    147498 - CAN-2004-0888 xpdf integer overflows
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
    b60b54705036ba2e88cb3dcef571345f  xpdf-3.00-11.5.src.rpm
    
    i386:
    10c5366f6a05e00c1adccd347540eaa3  xpdf-3.00-11.5.i386.rpm
    
    ia64:
    13c4121b81b9f23823a1520bbbe32dc2  xpdf-3.00-11.5.ia64.rpm
    
    ppc:
    718b4a6f293d7ce1f86beef56045e1ce  xpdf-3.00-11.5.ppc.rpm
    
    s390:
    c71bcd78d9b3b2809e352c2fb9ec41e9  xpdf-3.00-11.5.s390.rpm
    
    s390x:
    0a6fa78e35440fea22fe15a4dd6f8d77  xpdf-3.00-11.5.s390x.rpm
    
    x86_64:
    2ff61884d72162aa86136d6e938ad2e8  xpdf-3.00-11.5.x86_64.rpm
    
    Red Hat Enterprise Linux Desktop version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
    b60b54705036ba2e88cb3dcef571345f  xpdf-3.00-11.5.src.rpm
    
    i386:
    10c5366f6a05e00c1adccd347540eaa3  xpdf-3.00-11.5.i386.rpm
    
    x86_64:
    2ff61884d72162aa86136d6e938ad2e8  xpdf-3.00-11.5.x86_64.rpm
    
    Red Hat Enterprise Linux ES version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
    b60b54705036ba2e88cb3dcef571345f  xpdf-3.00-11.5.src.rpm
    
    i386:
    10c5366f6a05e00c1adccd347540eaa3  xpdf-3.00-11.5.i386.rpm
    
    ia64:
    13c4121b81b9f23823a1520bbbe32dc2  xpdf-3.00-11.5.ia64.rpm
    
    x86_64:
    2ff61884d72162aa86136d6e938ad2e8  xpdf-3.00-11.5.x86_64.rpm
    
    Red Hat Enterprise Linux WS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-11.5.src.rpm
    b60b54705036ba2e88cb3dcef571345f  xpdf-3.00-11.5.src.rpm
    
    i386:
    10c5366f6a05e00c1adccd347540eaa3  xpdf-3.00-11.5.i386.rpm
    
    ia64:
    13c4121b81b9f23823a1520bbbe32dc2  xpdf-3.00-11.5.ia64.rpm
    
    x86_64:
    2ff61884d72162aa86136d6e938ad2e8  xpdf-3.00-11.5.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"5","type":"x","order":"2","pct":83.33,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.