drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in gpdf
Name: |
Ausführen beliebiger Kommandos in gpdf |
|
ID: |
RHSA-2007:1025-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Mi, 7. November 2007, 20:20 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393 |
|
Applikationen: |
GNOME |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: gpdf security update Advisory ID: RHSA-2007:1025-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1025.html Issue date: 2007-11-07 Updated on: 2007-11-07 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 - ---------------------------------------------------------------------
1. Summary:
Updated gpdf packages that fix several security issues are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
gpdf is a GNOME-based viewer for Portable Document Format (PDF) files.
Alin Rad Pop discovered several flaws in the handling of PDF files. An attacker could create a malicious PDF file that would cause gpdf to crash, or potentially execute arbitrary code when opened. (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393)
Users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
345101 - CVE-2007-4352 xpdf memory corruption in DCTStream::readProgressiveDataUnit() 345111 - CVE-2007-5392 xpdf buffer overflow in DCTStream::reset() 345121 - CVE-2007-5393 xpdf buffer overflow in CCITTFaxStream::lookChar()
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386: 1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64: 79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
ppc: 54b9638c6ec4dcf40e2ed9399a127c56 gpdf-2.8.2-7.7.1.ppc.rpm 92a06e76972699dcd242b24f30f56987 gpdf-debuginfo-2.8.2-7.7.1.ppc.rpm
s390: 8a4e50dc8f5adcda54a25813bba540c5 gpdf-2.8.2-7.7.1.s390.rpm 79a6de142fd15e34df673af511e6eafc gpdf-debuginfo-2.8.2-7.7.1.s390.rpm
s390x: 86f6acbeb9e3edc17002663f61666f69 gpdf-2.8.2-7.7.1.s390x.rpm 1e62bdfdd4b48024ca2265fa59678c76 gpdf-debuginfo-2.8.2-7.7.1.s390x.rpm
x86_64: 357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm 5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: gpdf-2.8.2-7.7.1.src.rpm f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386: 1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
x86_64: 357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm 5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386: 1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64: 79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
x86_64: 357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm 5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gpdf-2.8.2-7.7.1.src.rpm f4f7acbb9f48478834983b75d291de4d gpdf-2.8.2-7.7.1.src.rpm
i386: 1b72ecf4d50090e7545c891f79a27903 gpdf-2.8.2-7.7.1.i386.rpm af1afe26edee84377625ba76a224aae8 gpdf-debuginfo-2.8.2-7.7.1.i386.rpm
ia64: 79a213a5e41a001b776f8d92284aa658 gpdf-2.8.2-7.7.1.ia64.rpm d5cf5fd3e1345d9c5bda4bdcbfac1fa7 gpdf-debuginfo-2.8.2-7.7.1.ia64.rpm
x86_64: 357b7239bf3a6d8fec64605cf2f067aa gpdf-2.8.2-7.7.1.x86_64.rpm 5d5ba42a3326876395e2adc9cdc449c5 gpdf-debuginfo-2.8.2-7.7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHMf7DXlSAg2UNWIIRAll5AJoDsgTuqzsUuEQKtTU3iJGHJUOc6ACglakm XYL66Qo4/whybCH8/a8oCn4= =upjV -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|