Lucene search

K
gentooGentoo FoundationGLSA-200602-05
HistoryFeb 12, 2006 - 12:00 a.m.

KPdf: Heap based overflow

2006-02-1200:00:00
Gentoo Foundation
security.gentoo.org
15

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.8%

Background

KPdf is a KDE-based PDF viewer included in the kdegraphics package.

Description

KPdf includes Xpdf code to handle PDF files. Dirk Mueller discovered that the Xpdf code is vulnerable a heap based overflow in the splash rasterizer engine.

Impact

An attacker could entice a user to open a specially crafted PDF file with Kpdf, potentially resulting in the execution of arbitrary code with the rights of the user running the affected application.

Workaround

There is no known workaround at this time.

Resolution

All kdegraphics users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r4"

All Kpdf users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/kdegraphics< 3.4.3-r4UNKNOWN
Gentooanyallkde-base/kpdf< 3.4.3-r4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.8%