Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-03-03 Thread Hilmar Preusse
severity 346086 important
tags 346086 + woody
# as discussed the bug is fixed in sid and sarge. In woody is a hunk
# missing, which could lead to a hang of xpdf. We consider this not to
# be critical. Lowering severity. Bug will be closed if the support
# for woody has ended.
stop

On 31.01.06 Frank Küster ([EMAIL PROTECTED]) wrote:
 Hilmar Preusse [EMAIL PROTECTED] wrote:

Hi,

  So, the last hunk seems not to exist in cupsys_1.1.14-5woody14.
  Should we submit a bug against it?
 
 Yes, definitely
 
Done. #355122

  Further I suggest to close the bug now or at least downgrade it
  to important and close it as soon as the support for woody has
  ended.
 
 I'd keep it open as important as long as woody is supported.
 
OK, downgrading.

H.
-- 
sigmentation fault



Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-31 Thread Hilmar Preusse
On 27.01.06 Martin Pitt ([EMAIL PROTECTED]) wrote:
 Hilmar Preusse [2006-01-27  9:56 +0100]:

Hi,

  So, what is that now?
  
  - a security leak, which must be fixed
  - rather an inconvenience, which should be fixed?
 
 For CUPS it was a real DoS which must be fixed, but for tetex-bin
 it's just an inconvenience; there will be few systems which
 automatically process untrusted LaTeX documents with PDF files sent
 by remote attackers.
 
So, the last hunk seems not to exist in cupsys_1.1.14-5woody14.
Should we submit a bug against it?
Further I suggest to close the bug now or at least downgrade it to
important and close it as soon as the support for woody has ended.

Regards,
  Hilmar
-- 
sigmentation fault


pgpbTi0A4hQD5.pgp
Description: PGP signature


Bug#346086: [SPAM?]: Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-31 Thread Frank Küster
Hilmar Preusse [EMAIL PROTECTED] wrote:

 So, the last hunk seems not to exist in cupsys_1.1.14-5woody14.
 Should we submit a bug against it?

Yes, definitely

 Further I suggest to close the bug now or at least downgrade it to
 important and close it as soon as the support for woody has ended.

I'd keep it open as important as long as woody is supported.

Regards, Frank
-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX)




Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-27 Thread Hilmar Preusse
notfound 346086 2.0.2-30sarge4
found 346086 1.0.7+20011202-7.7
stop

On 26.01.06 Martin Pitt ([EMAIL PROTECTED]) wrote:
 Hilmar Preusse [2006-01-23 18:30 +0100]:

Hi all,

  On the DSA page Joey states, that the problem is solved for
  oldstable too. The .orig.tar.gz contains a patched Stream.cc,
  which got the same modifications as your patch contain, except
  the last hunk. I'm attaching it. Could you evluate if the hunk is
  necessary.
  If not I guess we're done here and can close #346086.
 
 This is precisely the fix that is required to avoid endless loops
 with prematurely ending PDF files (CVE-2005-3625). So it is not
 exploitable to execute any code or something, but it's still a
 nasty DoS, particularly in Cups. So I would prefer to apply it,
 especially since it's such an easy and straightforward change.
 
So, what is that now?

- a security leak, which must be fixed
- rather an inconvenience, which should be fixed?

Does that bug deserve still the severity critical? If not I propose
to lower the severity to important, keep that bug open until the
support for oldstable has ended and close the bug then. For now I
mark that bug as not found in 2.0.2-30sarge4 and found in
1.0.7+20011202-7.7 .

Regards,
  Hilmar
-- 
sigmentation fault


pgp5AZ6f4wR9b.pgp
Description: PGP signature


Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-27 Thread Martin Pitt
Hi Hilmar!

Hilmar Preusse [2006-01-27  9:56 +0100]:
  This is precisely the fix that is required to avoid endless loops
  with prematurely ending PDF files (CVE-2005-3625). So it is not
  exploitable to execute any code or something, but it's still a
  nasty DoS, particularly in Cups. So I would prefer to apply it,
  especially since it's such an easy and straightforward change.
  
 So, what is that now?
 
 - a security leak, which must be fixed
 - rather an inconvenience, which should be fixed?

For CUPS it was a real DoS which must be fixed, but for tetex-bin it's
just an inconvenience; there will be few systems which automatically
process untrusted LaTeX documents with PDF files sent by remote
attackers.

 Does that bug deserve still the severity critical? If not I propose
 to lower the severity to important, keep that bug open until the
 support for oldstable has ended and close the bug then. For now I
 mark that bug as not found in 2.0.2-30sarge4 and found in
 1.0.7+20011202-7.7 .

Works for me.

Thanks,

Martin
-- 
Martin Pitthttp://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?


signature.asc
Description: Digital signature


Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-26 Thread Martin Pitt
Hi!

Hilmar Preusse [2006-01-23 18:30 +0100]:
 On the DSA page Joey states, that the problem is solved for oldstable
 too. The .orig.tar.gz contains a patched Stream.cc, which got the
 same modifications as your patch contain, except the last hunk. I'm
 attaching it. Could you evluate if the hunk is necessary.
 If not I guess we're done here and can close #346086.

 @@ -3100,9 +3107,11 @@ int DCTStream::readMarker() {
do {
  do {
c = str-getChar();
 +  if(c == EOF) return EOF;
  } while (c != 0xff);
  do {
c = str-getChar();
 +  if(c == EOF) return EOF;
  } while (c == 0xff);
} while (c == 0x00);
return c;

This is precisely the fix that is required to avoid endless loops with
prematurely ending PDF files (CVE-2005-3625). So it is not exploitable to
execute any code or something, but it's still a nasty DoS,
particularly in Cups. So I would prefer to apply it, especially since
it's such an easy and straightforward change.

Thanks,

Martin

-- 
Martin Pitthttp://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?


signature.asc
Description: Digital signature


Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-23 Thread Hilmar Preusse
On 05.01.06 Martin Pitt ([EMAIL PROTECTED]) wrote:

Hi Martin,

 Chris Evans found some more integer overflows in the xpdf code [1]
 which affect tetex-bin as well. [1] also has demo exploit PDFs for
 patch checking.
 
 See [2] for the Ubuntu debdiff. 
 
 This only affects sarge (and woody); luckily sid is finally cured
 forever due to poppler, so please mark this bug as fixed in sid.
 
 Thanks,
 
 Martin
 
 [1] http://scary.beasts.org/security/b0dfca810501f2da/CESA-2005-003.txt
 [2] http://patches.ubuntu.com/patches/tetex-bin.CVE-2005-3624_5_7.diff
 
The problem is for 3.0 solved as we use libpoppler.

http://www.debian.org/security/2006/dsa-937 refers to CVE-2005-3624,
CVE-2005-3625, CVE-2005-3627. In Debian stable (2.0.2-sarge4) is a
patch contained, named patch-CVE-2005-3624_5_7. That one is identical
to your patch posted on Ubuntu. Hence I guess that bug is solved for
stable.
On the DSA page Joey states, that the problem is solved for oldstable
too. The .orig.tar.gz contains a patched Stream.cc, which got the
same modifications as your patch contain, except the last hunk. I'm
attaching it. Could you evluate if the hunk is necessary.
If not I guess we're done here and can close #346086.

Thanks,
  Hilmar
-- 
sigmentation fault
@@ -3100,9 +3107,11 @@ int DCTStream::readMarker() {
   do {
 do {
   c = str-getChar();
+  if(c == EOF) return EOF;
 } while (c != 0xff);
 do {
   c = str-getChar();
+  if(c == EOF) return EOF;
 } while (c == 0xff);
   } while (c == 0x00);
   return c;


Bug#346086: tetex-bin: New integer overflows in xpdf copy [CVE-2005-3624, CVE-2005-3625, CVE-2005-3627]

2006-01-05 Thread Martin Pitt
Package: tetex-bin
Version: 2.0.2-30
Severity: critical
Tags: security patch

Hi!

Chris Evans found some more integer overflows in the xpdf code [1] which affect
tetex-bin as well. [1] also has demo exploit PDFs for patch checking.

See [2] for the Ubuntu debdiff. 

This only affects sarge (and woody); luckily sid is finally cured
forever due to poppler, so please mark this bug as fixed in sid.

Thanks,

Martin

[1] http://scary.beasts.org/security/b0dfca810501f2da/CESA-2005-003.txt
[2] http://patches.ubuntu.com/patches/tetex-bin.CVE-2005-3624_5_7.diff

-- 
Martin Pitthttp://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?


signature.asc
Description: Digital signature