Skip to navigation

Security Advisory xpdf security update

Advisory: RHSA-2005:059-05
Type: Security Advisory
Severity: Important
Issued on: 2005-01-26
Last updated on: 2005-01-26
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2005-0064

Details

Updated Xpdf package that fixes a stack based buffer overflow security issue
is now available.

Xpdf is an X Window System based viewer for Portable Document Format (PDF)
files.

A buffer overflow flaw was found when processing the /Encrypt /Length tag.
An attacker could construct a carefully crafted PDF file that could cause
Xpdf to crash or possibly execute arbitrary code when opened. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0064 to this issue.

Red Hat believes that the Exec-Shield technology (enabled by default since
Update 3) will block attempts to exploit this vulnerability on x86
architectures.

All users of the Xpdf package should upgrade to this updated package,
which resolves this issue


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

IA-32:
xpdf-2.02-9.5.i386.rpm
File outdated by:  RHSA-2010:0750
    MD5: 66b2b8703c747d9d06acd1281487fbc5
 
x86_64:
xpdf-2.02-9.5.x86_64.rpm
File outdated by:  RHSA-2010:0750
    MD5: d7cb251b33b80ca2daaa02cb3f746899
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
xpdf-2.02-9.5.i386.rpm
File outdated by:  RHSA-2010:0750
    MD5: 66b2b8703c747d9d06acd1281487fbc5
 
IA-64:
xpdf-2.02-9.5.ia64.rpm
File outdated by:  RHSA-2010:0750
    MD5: 724f57f3e393c12986305f9fd5a1ede2
 
PPC:
xpdf-2.02-9.5.ppc.rpm
File outdated by:  RHSA-2010:0750
    MD5: 086666a3b1f21bc428ce82378bfa97e5
 
s390:
xpdf-2.02-9.5.s390.rpm
File outdated by:  RHSA-2010:0750
    MD5: 5cdff857e8cc9a8ab1ca5207578b62ce
 
s390x:
xpdf-2.02-9.5.s390x.rpm
File outdated by:  RHSA-2010:0750
    MD5: 13ebfda5ccf35633d6566fe223256875
 
x86_64:
xpdf-2.02-9.5.x86_64.rpm
File outdated by:  RHSA-2010:0750
    MD5: d7cb251b33b80ca2daaa02cb3f746899
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
xpdf-2.02-9.5.i386.rpm
File outdated by:  RHSA-2010:0750
    MD5: 66b2b8703c747d9d06acd1281487fbc5
 
IA-64:
xpdf-2.02-9.5.ia64.rpm
File outdated by:  RHSA-2010:0750
    MD5: 724f57f3e393c12986305f9fd5a1ede2
 
x86_64:
xpdf-2.02-9.5.x86_64.rpm
File outdated by:  RHSA-2010:0750
    MD5: d7cb251b33b80ca2daaa02cb3f746899
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
xpdf-2.02-9.5.i386.rpm
File outdated by:  RHSA-2010:0750
    MD5: 66b2b8703c747d9d06acd1281487fbc5
 
IA-64:
xpdf-2.02-9.5.ia64.rpm
File outdated by:  RHSA-2010:0750
    MD5: 724f57f3e393c12986305f9fd5a1ede2
 
x86_64:
xpdf-2.02-9.5.x86_64.rpm
File outdated by:  RHSA-2010:0750
    MD5: d7cb251b33b80ca2daaa02cb3f746899
 

Bugs fixed (see bugzilla for more information)

145049 - CAN-2005-0064 xpdf buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/