Your message dated Wed, 19 Jan 2005 15:55:43 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#291266: vulnerable to CAN-2005-0064 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 19 Jan 2005 18:53:11 +0000 >From [EMAIL PROTECTED] Wed Jan 19 10:53:11 2005 Return-path: <[EMAIL PROTECTED]> Received: from kitenet.net [64.62.161.42] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CrKx4-00025v-00; Wed, 19 Jan 2005 10:53:10 -0800 Received: from dragon.kitenet.net (unknown [66.168.94.144]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK)) by kitenet.net (Postfix) with ESMTP id 67B5F17E68 for <[EMAIL PROTECTED]>; Wed, 19 Jan 2005 18:53:10 +0000 (GMT) Received: by dragon.kitenet.net (Postfix, from userid 1000) id CEB2E6E5A8; Wed, 19 Jan 2005 13:55:07 -0500 (EST) Date: Wed, 19 Jan 2005 13:55:06 -0500 From: Joey Hess <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: vulnerable to CAN-2005-0064 Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="EuxKj2iCbKjpUGkD" Content-Disposition: inline X-Reportbug-Version: 3.5 User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --EuxKj2iCbKjpUGkD Content-Type: multipart/mixed; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: xpdf-reader Version: 3.00-11 Severity: grave Tags: patch security xpdf is vulnerable to a buffer overflow that can be exploited by malicious pdfs to execute arbitrary code. The hole is described here: http://www.idefense.com/application/poi/display?id=3D186&type=3Dvulnerabili= ties&flashstatus=3Dfalse I've attached a patch that adds bounds checking to close the hole. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.27 Locale: LANG=3Den_US.UTF-8, LC_CTYPE=3Den_US.UTF-8 (charmap=3DUTF-8) Versions of packages xpdf depends on: ii xpdf-common 3.00-11 Portable Document Format (PDF)= sui ii xpdf-reader 3.00-11 Portable Document Format (PDF)= sui ii xpdf-utils 3.00-11 Portable Document Format (PDF)= sui Versions of packages xpdf-reader depends on: ii gsfonts 8.14+v8.11-0.1 Fonts for the Ghostscript inte= rpre ii lesstif2 1:0.93.94-11 OSF/Motif 2.1 implementation r= elea ii libc6 2.3.2.ds1-20 GNU C Library: Shared librarie= s an ii libfreetype6 2.1.7-2.3 FreeType 2 font engine, shared= lib ii libgcc1 1:3.4.3-7 GCC support library ii libice6 4.3.0.dfsg.1-10 Inter-Client Exchange library ii libpaper1 1.1.14-3 Library for handling paper cha= ract ii libsm6 4.3.0.dfsg.1-10 X Window System Session Manage= ment ii libstdc++5 1:3.3.5-6 The GNU Standard C++ Library v3 ii libt1-5 5.0.2-3 Type 1 font rasterizer library= - r ii libx11-6 4.3.0.dfsg.1-10 X Window System protocol clien= t li ii libxext6 4.3.0.dfsg.1-10 X Window System miscellaneous = exte ii libxp6 4.3.0.dfsg.1-10 X Window System printing exten= sion ii libxpm4 4.3.0.dfsg.1-10 X pixmap library ii libxt6 4.3.0.dfsg.1-10 X Toolkit Intrinsics ii xlibs 4.3.0.dfsg.1-10 X Keyboard Extension (XKB) con= figu ii xpdf-common 3.00-11 Portable Document Format (PDF)= sui ii zlib1g 1:1.2.2-4 compression library - runtime -- no debconf information --=20 see shy jo --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="xpdf-3.00pl3.patch" *** XRef.cc.orig Wed Jan 12 17:10:53 2005 --- XRef.cc Wed Jan 12 17:11:22 2005 *************** *** 793,798 **** --- 793,801 ---- } else { keyLength = 5; } + if (keyLength > 16) { + keyLength = 16; + } permFlags = permissions.getInt(); if (encVersion >= 1 && encVersion <= 2 && encRevision >= 2 && encRevision <= 3) { --vtzGhvizbBRQ85DL-- --EuxKj2iCbKjpUGkD Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB7q0Jd8HHehbQuO8RAohpAJ9WCh6xiN7LYv9MD4CinEo026h/+wCcCwIV 2NOVgyGRDTmJ2esKS8jdCJ0= =JgTC -----END PGP SIGNATURE----- --EuxKj2iCbKjpUGkD-- --------------------------------------- Received: (at 291266-done) by bugs.debian.org; 19 Jan 2005 20:53:54 +0000 >From [EMAIL PROTECTED] Wed Jan 19 12:53:54 2005 Return-path: <[EMAIL PROTECTED]> Received: from kitenet.net [64.62.161.42] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CrMpu-0003ud-00; Wed, 19 Jan 2005 12:53:54 -0800 Received: from dragon.kitenet.net (unknown [66.168.94.144]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK)) by kitenet.net (Postfix) with ESMTP id 36C4B18081 for <[EMAIL PROTECTED]>; Wed, 19 Jan 2005 20:53:53 +0000 (GMT) Received: by dragon.kitenet.net (Postfix, from userid 1000) id 69D4A6F244; Wed, 19 Jan 2005 15:55:43 -0500 (EST) Date: Wed, 19 Jan 2005 15:55:43 -0500 From: Joey Hess <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: Bug#291266: vulnerable to CAN-2005-0064 Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="MGYHOYXEY6WxJCY8" Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --MGYHOYXEY6WxJCY8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Martin Schulze wrote: > Joey Hess wrote: > > xpdf is vulnerable to a buffer overflow that can be exploited by > > malicious pdfs to execute arbitrary code. The hole is described here: > > http://www.idefense.com/application/poi/display?id=3D186&type=3Dvulnera= bilities&flashstatus=3Dfalse > >=20 > > I've attached a patch that adds bounds checking to close the hole. >=20 > For the unstable distribution (sid) this problem has been fixed in > version 3.00-12. >=20 > It's in Incoming already. >=20 > Just FYI. >=20 > Regards, >=20 > Joey >=20 > --=20 > Ten years and still binary compatible. -- XFree86 >=20 > Please always Cc to me when replying to me on the lists. >=20 >=20 > --=20 > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] =2Eorg >=20 --=20 see shy jo --MGYHOYXEY6WxJCY8 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB7slPd8HHehbQuO8RAoj6AKDS/2/iDxSmsKUbKkG119qTDpqXzwCgp2Cn ah4DrfgcYwlXQx+6UUesZ5w= =Nxid -----END PGP SIGNATURE----- --MGYHOYXEY6WxJCY8-- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]