* SECURITY UPDATE:
    - CVE-2007-4352: Array index error in the 
DCTStream::readProgressiveDataUnit i
      method in xpdf/Stream.cc in Xpdf 3.02 with xpdf-3.02pl1.patch allows 
      remote attackers to trigger memory corruption and execute arbitrary code 
via a crafted PDF file.
    - CVE-2007-5392: Integer overflow in the DCTStream::reset method in 
xpdf/Stream.cc 
      in Xpdf 3.02 with xpdf-3.02pl1.patch allows remote attackers  
      to execute arbitrary code via a crafted PDF file, resulting in a 
heap-based buffer overflow.
    - CVE-2007-5393: Heap-based buffer overflow in the CCITTFaxStream::lookChar 
method in xpdf/Stream.cc 
      in Xpdf 3.02 with xpdf-3.02pl1.patch allows remote attackers to execute 
arbitrary code via a PDF 
      file that contains a crafted CCITTFaxDecode filter.
  * debian/patches/fix-CVE-2007-5393_2007-5392_2007-4352.dpatch: added patch by 
Nico Golde <[EMAIL PROTECTED]>
    to fix those issues (LP: #160944)
  * References: 
    CVE-2007-4352
    CVE-2007-5392
    CVE-2007-5393
    http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629


** Attachment added: "gutsy debdiff to fix this three CVE issues"
   http://launchpadlibrarian.net/10340087/gutsy_xpdf_3.02-1.2ubuntu1.1.debdiff

-- 
[xpdf] multiple security vulnerabilities
https://bugs.launchpad.net/bugs/160944
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to