Security hole in XPDF and KDE
The KDE developers have published a security advisory concerning a vulnerability when processing crafted PDFs. Opening one of these files with XPDF, kpdf, KOffice or any other software which has adopted the source code from XPDF can cause a buffer overflow and execution of an arbitrary program code.
The bug stems from an integer overflow in the function StreamPredictor::StreamPredictor(). The developers have prepared source-code patches for the software versions affected. The bug is found in XPDF 3.02 and possibly the previous versions, KDE 3.2.0 up to and including 3.5.7 as well as KOffice 1.2.1 and later versions.
Other applications which use the faulty code from XPDF also contain the vulnerability. Red Hat has now also released software updates for CUPS, gpdf and poppler which close the hole. The other Linux distributors are also soon to release up-dated packages, which users should install as soon as they can.
- kpdf/kword/xpdf stack based buffer overflow, security advisory from KDE developers
- cups security update, bug report from Red Hat
- gpdf security update, bug report from Red Hat
- poppler security update, bug report from Red Hat
- Source-code patch for XPDF
- Source-code patch for KDE 3.3.2 and later versions
- Source-code patch for KOffice 1.2.1 and later versions
(mba)