From: Mandriva Security Team <security@mandriva.com.>
To: [email protected]Subject: MDKSA-2006:008 - Updated koffice packages fix several vulnerabilities
Message-Id: <E1Ev0hg-0008Hh-U8@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
Date: Fri, 06 Jan 2006 16:09:00 -0700
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:008
http://www.mandriva.com/security/
_______________________________________________________________________
Package : koffice
Date : January 6, 2006
Affected: 2006.0
_______________________________________________________________________
Problem Description:
Multiple heap-based buffer overflows in the
DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions
in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier,
allow user-complicit attackers to cause a denial of service (heap
corruption) and possibly execute arbitrary code via a crafted PDF file
with an out-of-range number of components (numComps), which is used as
an array index. (CVE-2005-3191)
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01
allows remote attackers to execute arbitrary code via a PDF file with
an out-of-range numComps (number of components) field. (CVE-2005-3192)
Heap-based buffer overflow in the JPXStream::readCodestream function
in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier
allows user-complicit attackers to cause a denial of service (heap
corruption) and possibly execute arbitrary code via a crafted PDF file
with large size values that cause insufficient memory to be allocated.
(CVE-2005-3193)
An additional patch re-addresses memory allocation routines in
goo/gmem.c (Martin Pitt/Canonical, Dirk Mueller/KDE).
In addition, Chris Evans discovered several other vulnerbilities in
the xpdf code base:
Out-of-bounds heap accesses with large or negative parameters to
"FlateDecode" stream. (CVE-2005-3192)
Out-of-bounds heap accesses with large or negative parameters to
"CCITTFaxDecode" stream. (CVE-2005-3624)
Infinite CPU spins in various places when stream ends unexpectedly.
(CVE-2005-3625)
NULL pointer crash in the "FlateDecode" stream. (CVE-2005-3626)
Overflows of compInfo array in "DCTDecode" stream. (CVE-2005-3627)
Possible to use index past end of array in "DCTDecode" stream.
(CVE-2005-3627)
Possible out-of-bounds indexing trouble in "DCTDecode" stream.
(CVE-2005-3627)
Koffice uses an embedded copy of the xpdf code, with the same
vulnerabilities.
The updated packages have been patched to correct these problems.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
5decbf029bf4482d1f93ea0df446121f 2006.0/RPMS/koffice-1.4.2-11.2.20060mdk.i586.rpm
2aca3ec22b051466aeb57c82b26d12aa 2006.0/RPMS/koffice-karbon-1.4.2-11.2.20060mdk.i586.rpm
f39b2a5a7ef35a0f579a0055b1c429c4 2006.0/RPMS/koffice-kexi-1.4.2-11.2.20060mdk.i586.rpm
caab0530fcfcf10ec5913e7b101541c6 2006.0/RPMS/koffice-kformula-1.4.2-11.2.20060mdk.i586.rpm
0a3732921e20069fd3b5cbac8c4733a9 2006.0/RPMS/koffice-kivio-1.4.2-11.2.20060mdk.i586.rpm
e4d711f1487f3716f19527950bb64283 2006.0/RPMS/koffice-koshell-1.4.2-11.2.20060mdk.i586.rpm
f5013764806edfcf9a31503b613459a2 2006.0/RPMS/koffice-kpresenter-1.4.2-11.2.20060mdk.i586.rpm
668a7eb653da4db18b2e1c9daefb7e94 2006.0/RPMS/koffice-krita-1.4.2-11.2.20060mdk.i586.rpm
ebb18a9011e702f01718c4c2b4d759e1 2006.0/RPMS/koffice-kspread-1.4.2-11.2.20060mdk.i586.rpm
89a8d46e5768595584fcdbe307add521 2006.0/RPMS/koffice-kugar-1.4.2-11.2.20060mdk.i586.rpm
1e9b58585bf742239b210e8519ed0d8f 2006.0/RPMS/koffice-kword-1.4.2-11.2.20060mdk.i586.rpm
e5e19df847dc2693066a922f73b42c50 2006.0/RPMS/koffice-progs-1.4.2-11.2.20060mdk.i586.rpm
fa63274a949dd60692888f515606f079 2006.0/RPMS/libkoffice2-karbon-1.4.2-11.2.20060mdk.i586.rpm
8bedc58288b05ffb3134c07b7d46a118 2006.0/RPMS/libkoffice2-karbon-devel-1.4.2-11.2.20060mdk.i586.rpm
681887908face81c17a37ca00d6c6022 2006.0/RPMS/libkoffice2-kexi-1.4.2-11.2.20060mdk.i586.rpm
eab5ad72e95f108b923f3bf32bbe10f5 2006.0/RPMS/libkoffice2-kexi-devel-1.4.2-11.2.20060mdk.i586.rpm
7e4b3718e863d0f66f2b7daca2a25f83 2006.0/RPMS/libkoffice2-kformula-1.4.2-11.2.20060mdk.i586.rpm
bad0d716230bad4a9fe0ae27017b0ef7 2006.0/RPMS/libkoffice2-kformula-devel-1.4.2-11.2.20060mdk.i586.rpm
077a3368bef791e1105ba82e41424847 2006.0/RPMS/libkoffice2-kivio-1.4.2-11.2.20060mdk.i586.rpm
8091986d4999e3a702db1139c4cd1ac1 2006.0/RPMS/libkoffice2-kivio-devel-1.4.2-11.2.20060mdk.i586.rpm
74eee88d1cafaab8ff4bbbe9717a0e6c 2006.0/RPMS/libkoffice2-koshell-1.4.2-11.2.20060mdk.i586.rpm
25524a101fb458bfa15bf56706f1d02d 2006.0/RPMS/libkoffice2-kpresenter-1.4.2-11.2.20060mdk.i586.rpm
e37ecf1e3aa338df37fa210aaf7822dd 2006.0/RPMS/libkoffice2-krita-1.4.2-11.2.20060mdk.i586.rpm
cb1a07a6c9da09e6db6a506d8875daf8 2006.0/RPMS/libkoffice2-krita-devel-1.4.2-11.2.20060mdk.i586.rpm
d1594075f9152ac891bb1bf2c3348770 2006.0/RPMS/libkoffice2-kspread-1.4.2-11.2.20060mdk.i586.rpm
5f026461f8fba599df483bbaefcf8b23 2006.0/RPMS/libkoffice2-kspread-devel-1.4.2-11.2.20060mdk.i586.rpm
897cbd506eb32b4cfecd6d4430cf217a 2006.0/RPMS/libkoffice2-kugar-1.4.2-11.2.20060mdk.i586.rpm
7f4a36c89f799e2f6bf19e1bd9264f89 2006.0/RPMS/libkoffice2-kugar-devel-1.4.2-11.2.20060mdk.i586.rpm
3fe5da8dc83ca866d6ae3a2eb21ff0f0 2006.0/RPMS/libkoffice2-kword-1.4.2-11.2.20060mdk.i586.rpm
242ea66e5928964417859b1a26b665f8 2006.0/RPMS/libkoffice2-kword-devel-1.4.2-11.2.20060mdk.i586.rpm
264f937ee2f1678245d3786fb449a1e5 2006.0/RPMS/libkoffice2-progs-1.4.2-11.2.20060mdk.i586.rpm
6fc8f4494593692a215e6ace8bfc1112 2006.0/RPMS/libkoffice2-progs-devel-1.4.2-11.2.20060mdk.i586.rpm
d1aa09f80b3e57ecfd60f0a7e263094a 2006.0/SRPMS/koffice-1.4.2-11.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
895d2918a4723f99eb839c4d27306406 x86_64/2006.0/RPMS/koffice-1.4.2-11.2.20060mdk.x86_64.rpm
e24e0e322dfe02f73c5d1b0571158cf2 x86_64/2006.0/RPMS/koffice-karbon-1.4.2-11.2.20060mdk.x86_64.rpm
e22a93254fd15c0a7b672a1c6bcb91a0 x86_64/2006.0/RPMS/koffice-kexi-1.4.2-11.2.20060mdk.x86_64.rpm
39dcd78e2747823f30364a789a7d1193 x86_64/2006.0/RPMS/koffice-kformula-1.4.2-11.2.20060mdk.x86_64.rpm
c726114646f5fe94121cc2e48a4647b5 x86_64/2006.0/RPMS/koffice-kivio-1.4.2-11.2.20060mdk.x86_64.rpm
bfcdebd6ced8553c1a7eb6ea1ffddbb9 x86_64/2006.0/RPMS/koffice-koshell-1.4.2-11.2.20060mdk.x86_64.rpm
5f4d36c6c03dec33f6f88346fe1c8c11 x86_64/2006.0/RPMS/koffice-kpresenter-1.4.2-11.2.20060mdk.x86_64.rpm
515f8db1ae75c28717a7ed8b7475278f x86_64/2006.0/RPMS/koffice-krita-1.4.2-11.2.20060mdk.x86_64.rpm
4cfe74acd379f314f6ff2845920b64b7 x86_64/2006.0/RPMS/koffice-kspread-1.4.2-11.2.20060mdk.x86_64.rpm
6ec357843424d14fadbd457e49fc3c34 x86_64/2006.0/RPMS/koffice-kugar-1.4.2-11.2.20060mdk.x86_64.rpm
ac0a4544be03c14981d165c83dd0893e x86_64/2006.0/RPMS/koffice-kword-1.4.2-11.2.20060mdk.x86_64.rpm
1a6ddfd8cdde5c9fc9c23fa58e55a7e2 x86_64/2006.0/RPMS/koffice-progs-1.4.2-11.2.20060mdk.x86_64.rpm
9bf5725e0a5b369653bd579c6be151e6 x86_64/2006.0/RPMS/lib64koffice2-karbon-1.4.2-11.2.20060mdk.x86_64.rpm
bb80a747c3ba10682967664d58d5a3dc x86_64/2006.0/RPMS/lib64koffice2-karbon-devel-1.4.2-11.2.20060mdk.x86_64.rpm
8f7003b51389274cec77c0eaa4f620a1 x86_64/2006.0/RPMS/lib64koffice2-kexi-1.4.2-11.2.20060mdk.x86_64.rpm
b0058d2ffe854eb0fc7f6d3694b2cf0c x86_64/2006.0/RPMS/lib64koffice2-kexi-devel-1.4.2-11.2.20060mdk.x86_64.rpm
0c2dfe7985b8d29b11fb6d5f3bc5f187 x86_64/2006.0/RPMS/lib64koffice2-kformula-1.4.2-11.2.20060mdk.x86_64.rpm
fe64e075b725f2003ad4b3b75e633815 x86_64/2006.0/RPMS/lib64koffice2-kformula-devel-1.4.2-11.2.20060mdk.x86_64.rpm
1ce7238b2d8494313df1f71cb5ab45ee x86_64/2006.0/RPMS/lib64koffice2-kivio-1.4.2-11.2.20060mdk.x86_64.rpm
4a64f4ef06c4404f7d77685d195c11ba x86_64/2006.0/RPMS/lib64koffice2-kivio-devel-1.4.2-11.2.20060mdk.x86_64.rpm
92fea6a7449391fc2c35e02044d03e83 x86_64/2006.0/RPMS/lib64koffice2-koshell-1.4.2-11.2.20060mdk.x86_64.rpm
a99e683d8c5585df998d5735d4c01f7d x86_64/2006.0/RPMS/lib64koffice2-kpresenter-1.4.2-11.2.20060mdk.x86_64.rpm
5f19278c29cf6656d9a56ef39f14d145 x86_64/2006.0/RPMS/lib64koffice2-krita-1.4.2-11.2.20060mdk.x86_64.rpm
930b637523e583344c0303844496e768 x86_64/2006.0/RPMS/lib64koffice2-krita-devel-1.4.2-11.2.20060mdk.x86_64.rpm
880b0863b0c0f0ddcde22207abac3164 x86_64/2006.0/RPMS/lib64koffice2-kspread-1.4.2-11.2.20060mdk.x86_64.rpm
cd0b2c995b2ef8c9f90dbb35349b1b95 x86_64/2006.0/RPMS/lib64koffice2-kspread-devel-1.4.2-11.2.20060mdk.x86_64.rpm
d4fa15a626d04a31222c596e9b0781a3 x86_64/2006.0/RPMS/lib64koffice2-kugar-1.4.2-11.2.20060mdk.x86_64.rpm
0562292a610452f83c5070791aeac977 x86_64/2006.0/RPMS/lib64koffice2-kugar-devel-1.4.2-11.2.20060mdk.x86_64.rpm
ecc6a0c00d8c9160400db4c1698a918e x86_64/2006.0/RPMS/lib64koffice2-kword-1.4.2-11.2.20060mdk.x86_64.rpm
0b87a74b84ed37b1d95e5a61247bbe39 x86_64/2006.0/RPMS/lib64koffice2-kword-devel-1.4.2-11.2.20060mdk.x86_64.rpm
5935898f0e48d386a8f50d1be0f39e62 x86_64/2006.0/RPMS/lib64koffice2-progs-1.4.2-11.2.20060mdk.x86_64.rpm
f96c5fd8d1e3366a3bef48ef49d52559 x86_64/2006.0/RPMS/lib64koffice2-progs-devel-1.4.2-11.2.20060mdk.x86_64.rpm
d1aa09f80b3e57ecfd60f0a7e263094a x86_64/2006.0/SRPMS/koffice-1.4.2-11.2.20060mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFDvs3umqjQ0CJFipgRAsQWAKDhkKglUv6U7HiqveMCZl+UYqSnKQCfRF1P
VZDGDCNSiLOLUNqpi69LYE8=
=ZQ9V
-----END PGP SIGNATURE-----