RedHat: Important: xpdf security update RHSA-2005:034-01
Summary
Summary
Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to this issue. A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to this issue. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CAN-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0206 to this issue. All users of Xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
135066 - PDF is displayed garbled, older xpdf works
144197 - CAN-2004-1125 xpdf buffer overflow
145052 - CAN-2005-0064 xpdf buffer overflow
147498 - CAN-2004-0888 xpdf integer overflows
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
ppc:
718b4a6f293d7ce1f86beef56045e1ce xpdf-3.00-11.5.ppc.rpm
s390:
c71bcd78d9b3b2809e352c2fb9ec41e9 xpdf-3.00-11.5.s390.rpm
s390x:
0a6fa78e35440fea22fe15a4dd6f8d77 xpdf-3.00-11.5.s390x.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
b60b54705036ba2e88cb3dcef571345f xpdf-3.00-11.5.src.rpm
i386:
10c5366f6a05e00c1adccd347540eaa3 xpdf-3.00-11.5.i386.rpm
ia64:
13c4121b81b9f23823a1520bbbe32dc2 xpdf-3.00-11.5.ia64.rpm
x86_64:
2ff61884d72162aa86136d6e938ad2e8 xpdf-3.00-11.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
Package List
Topic
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Bugs Fixed