GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Oct 19, 2007 12:26 am Post subject: [ GLSA 200710-20 ] PDFKit, ImageKits: Buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: PDFKit, ImageKits: Buffer overflow (GLSA 200710-20)
Severity: normal
Exploitable: remote
Date: October 18, 2007
Bug(s): #188185
ID: 200710-20
Synopsis
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
overflow allowing for the user-assisted execution of arbitrary code.
Background
PDFKit is a framework for rendering of PDF content in GNUstep
applications. ImageKits is a collection of frameworks to support
imaging in GNUstep applications.
Affected Packages
Package: gnustep-libs/pdfkit
Vulnerable: <= 0.9_pre062906
Architectures: All supported architectures
Package: gnustep-libs/imagekits
Vulnerable: <= 0.6
Architectures: All supported architectures
Description
Maurycy Prodeus discovered an integer overflow vulnerability possibly
leading to a stack-based buffer overflow in the XPDF code which PDFKit
is based on. ImageKits also contains a copy of PDFKit.
Impact
By enticing a user to view a specially crafted PDF file with a viewer
based on ImageKits or PDFKit such as Gentoo's ViewPDF, a remote
attacker could cause an overflow, potentially resulting in the
execution of arbitrary code with the privileges of the user running the
application.
Workaround
There is no known workaround at this time.
Resolution
PDFKit and ImageKits are not maintained upstream, so the packages were
masked in Portage. We recommend that users unmerge PDFKit and
ImageKits:
Code: | # emerge --unmerge gnustep-libs/pdfkit
# emerge --unmerge gnustep-libs/imagekits |
As an alternative, users should upgrade their systems to use PopplerKit
instead of PDFKit and Vindaloo instead of ViewPDF.
References
CVE-2007-3387
GLSA 200709-12
Last edited by GLSA on Mon Jun 10, 2013 4:26 am; edited 1 time in total |
|