Lucene search

K
gentooGentoo FoundationGLSA-201311-20
HistoryNov 28, 2013 - 12:00 a.m.

Okular: Arbitrary code execution

2013-11-2800:00:00
Gentoo Foundation
security.gentoo.org
20

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.06 Low

EPSS

Percentile

93.5%

Background

Okular is a universal document viewer based on KPDF for KDE 4.

Description

Okular contains a heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp.

Impact

A remote attacker could entice a user to open a specially crafted PBD file using Okular, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Okular users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/okular-4.4.5-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/okular< 4.4.5-r2UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.06 Low

EPSS

Percentile

93.5%