aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-01-26 20:25:46 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-01-26 20:25:46 +0000
commit227998b8976cc66d21ff730fe60cdbc141ec0c67 (patch)
tree7e5c7642f44d7f0233e9c9e8f573f3651fc585b1 /security
parentf42f9e91fd7419b2afb678c1edba9ff1a9e6fd53 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml60
1 files changed, 60 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0a0b07b49776..68511446238f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,66 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f755545e-6fcd-11d9-abec-00061bd2d56f">
+ <topic>xpdf -- makeFileKey2() buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>xpdf</name>
+ <range><lt>3.00_6</lt></range>
+ </package>
+ <package>
+ <name>kdegraphics</name>
+ <range><lt>3.3.2_2</lt></range>
+ </package>
+ <package>
+ <name>gpdf</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>teTeX-base</name>
+ <range><lt>2.0.2_9</lt></range>
+ </package>
+ <package>
+ <name>cups-base</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>koffice</name>
+ <range><lt>1.3.5_2,1</lt></range>
+ </package>
+ <package>
+ <name>pdftohtml</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>An iDEFENSE Security Advisory reports:</p>
+ <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110608898221554">
+ <p>Remote exploitation of a buffer overflow vulnerability in
+ the xpdf PDF viewer included in multiple Unix and Linux
+ distributions could allow for arbitrary code execution as
+ the user viewing a PDF file.</p>
+ <p>The vulnerability specifically exists due to insufficient
+ bounds checking while processing a PDF file that provides
+ malicious values in the /Encrypt /Length tag. The
+ offending code can be found in the
+ <code>Decrypt::makeFileKey2</code> function in the source
+ file xpdf/Decrypt.cc.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-0064</cvename>
+ <mlist msgid="FB24803D1DF2A34FA59FC157B77C970503C8B298@idserv04.idef.com">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110608898221554</mlist>
+ <url>http://www.koffice.org/security/advisory-20050120-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2005-01-06</discovery>
+ <entry>2005-01-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d371b627-6ed5-11d9-bd18-000a95bc6fae">
<topic>zhcon -- unauthorized file access</topic>
<affects>