SuSe: kde pdf/ps arbitrary code execution vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: KDE
Announcement-ID: SuSE-SA:2003:0026
Date: Thu Apr 24 12:00:00 MEST 2003
Affected products: 7.1, 7.2, 7.3, 8.0, 8.1, 8.2
SuSE eMail Server 3.1
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7
SuSE Linux Office Server
Vulnerability Type: various security vulnerabilities
Severity (1-10): 5
SuSE default package: yes
Cross References: https://kde.org/info/security/advisory-20030409-1.txt
https://kde.org/info/security/advisory-20021220-1.txt
Content of this advisory:
1) security vulnerability resolved: Results of security audit of KDE.
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- glibc
- pptpd
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The K Desktop Environment KDE allows to generate postscript previews which
can be viewed via certain konqueror plug-ins for example. The previews
are generated by invoking the ghostscript program but without supplying the
"-dSAFER" option as an argument. This allows embedded code to be executed.
Additionally to the correction made to the postscript generation process,
various other security related bug fixes and patches from KDE 3.0.5a have
been incorporated. For more information regarding these fixes please visit
the URLs given as cross references.
The complete list of fixed packages is as follows:
kdelibs3
kdelibs3-cups
kdebase3
kdebase3-kdm
kdebase3-konqueror
kdebase3-ksysguardd
kdebase3-extra
kdegames3
kdegames3-board
kdegraphics3-fax
kdegraphics3-tex
kdegraphics3-viewer
kdegraphics3-postscript
kdemultimedia3-midi
kdemultimedia3-sound
kdemultimedia3-video
kdenetwork3
kdenetwork3-mail
kdenetwork3-chat
kdenetwork3-lan
kdepim3-organizer
kdepim3-kpilot
kdesdk3
kdeutils3
kdeutils3-laptop
Due to the large list of update packages we do not provide MD5 sums in this
advisory. This would blow up the advisory and make it unreadable.
Rather we recommend to either update your system via YaST2 where the
auto updater automatically checks the integrity of the packages or to follow
the guideline from section 3, "Package authenticity verification".
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- glibc
New glibc packages will be available soon which fix a RPC XDR integer
overflow. The packages are currently being tested.
- pptpd
A buffer overflow was found in the pptpd server. New packages will be
available soon.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References