The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


KDE Security Advisory: KOffice PDF Import Filter Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: Waldo Bastian <bastian@kde.org.>
To: [email protected]
Subject: KDE Security Advisory: KOffice PDF Import Filter Vulnerability
User-Agent: KMail/1.7.91
X-Face: "W;rAB>&6N~&NB#!^;{hcA,`fRf=`}uFMt{y\A~n4v'|V'b[T?Mdi=QQ!7O{-J0Nq@=?iso-8859-1?q?qscz=0A=09mnZ5XabWIl!?=)YKx<!?>(2/_;Azjbs4Q~[<XixQDG'966;]]l[D*\K,d1E^I%9u]j!`@=?iso-8859-1?q?XON=0A=09H1P=245YIt=7EPviZ?=@kz@&%
MIME-Version: 1.0
Date: Thu, 20 Jan 2005 23:05:43 +0100
Content-Type: multipart/signed;
  boundary="nextPart553130346.1nWHcy4Yhl";
  protocol="application/pgp-signature";
  micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <200501202305.46951.bastian@kde.org.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

--nextPart553130346.1nWHcy4Yhl
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

KDE Security Advisory: KOffice PDF Import Filter Vulnerability
Original Release Date: 2005-01-20
URL: http://www.kde.org/info/security/advisory-20050120-1.txt

0. References


   http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0064
   http://www.idefense.com/application/poi/display?id=3D186&type=3Dvulnerab=
ilities


1. Systems affected:


        KOffice 1.3 up to including KOffice 1.3.5


2. Overview:


        The KOffice PDF Import Filter shares code with xpdf. xpdf contains
        a buffer overflow that can be triggered by a specially crafted
        PDF file.


3. Impact:


        Remotely supplied pdf files can be used to execute arbitrary
        code on the client machine when the user opens such file in
        KOffice.


4. Solution:


        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:


        Patch for KOffice 1.3.5 is available from=20
        ftp://ftp.kde.org/pub/kde/security_patches :

        0e6194cbfe3f6d3b3c848c2c76ef5bfb  post-1.3.5-koffice.diff


6. Time line and credits:


        19/01/2005 KDE Security Team alerted by Carsten Lohrke
        19/01/2005 Patches from xpdf 3.00pl3 applied to KDE CVS and patches
                   prepared.=20
        20/01/2005 Public disclosure.


=2D-=20
[email protected]   |   Free Novell Linux Desktop 9 Evaluation Download
[email protected]  |   http://www.novell.com/products/desktop/eval.html

--nextPart553130346.1nWHcy4Yhl
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQBB8Cs6N4pvrENfboIRAj2uAJ9OO3Jipu9E22hpyuilUjQ0pQtCNwCgkREN
KDHq14niu3nIKgfdfoWyAJk=
=8Bdg
-----END PGP SIGNATURE-----

--nextPart553130346.1nWHcy4Yhl--



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру