aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2007-11-13 09:14:50 +0800
committerdelphij <delphij@FreeBSD.org>2007-11-13 09:14:50 +0800
commit36f8808f49c0a1d337163417d371844f022a7ae2 (patch)
tree7f9afb8f07a314606afe9635ef7c7f8ba8ad14cb
parent41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08 (diff)
downloadfreebsd-ports-gnome-36f8808f49c0a1d337163417d371844f022a7ae2.tar.gz
freebsd-ports-gnome-36f8808f49c0a1d337163417d371844f022a7ae2.tar.zst
freebsd-ports-gnome-36f8808f49c0a1d337163417d371844f022a7ae2.zip
Document xpdf arbitrary code execution vulnerability, as documented in
CVE-2007-4352, CVE-2007-5392, CVE-2007-5393. Approved by: portmgr (ports-security blanket)
-rw-r--r--security/vuxml/vuln.xml64
1 files changed, 64 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ffe97ff73eef..c2b3ca19db0e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,70 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2747fc39-915b-11dc-9239-001c2514716c">
+ <topic>xpdf -- multiple remote Stream.CC vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>cups-base</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>gpdf</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>kdegraphics</name>
+ <range><lt>3.5.8_1</lt></range>
+ </package>
+ <package>
+ <name>koffice</name>
+ <range><lt>1.6.3_3,2</lt></range>
+ </package>
+ <package>
+ <name>poppler</name>
+ <range><lt>0.6</lt></range>
+ </package>
+ <package>
+ <name>xpdf</name>
+ <range><lt>3.02_5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia Research reports:</p>
+ <blockquote cite="http://www.securityfocus.com/archive/1/483372">
+ <p>Secunia Research has discovered some vulnerabilities in Xpdf,
+ which can be exploited by malicious people to compromise a user's
+ system.</p>
+ <ul>
+ <li>An array indexing error within the
+ "DCTStream::readProgressiveDataUnit()" method in xpdf/Stream.cc
+ can be exploited to corrupt memory via a specially crafted PDF
+ file.</li>
+ <li>An integer overflow error within the "DCTStream::reset()"
+ method in xpdf/Stream.cc can be exploited to cause a heap-based
+ buffer overflow via a specially crafted PDF file.</li>
+ <li>A boundary error within the "CCITTFaxStream::lookChar()" method
+ in xpdf/Stream.cc can be exploited to cause a heap-based buffer
+ overflow by tricking a user into opening a PDF file containing a
+ specially crafted "CCITTFaxDecode" filter.<li>
+ </ul>
+ <p>Successful exploitation may allow execution of arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>26367</bid>
+ <cvename>CVE-2007-4352</cvename>
+ <cvename>CVE-2007-5392</cvename>
+ <cvename>CVE-2007-5393</cvename>
+ </references>
+ <dates>
+ <discovery>2007-11-07</discovery>
+ <entry>2007-11-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ffba6ab0-90b5-11dc-9835-003048705d5a">
<topic>plone -- unsafe data interpreted as pickles</topic>
<affects>