Your submission was sent successfully! Close

USN-2-1: xpdf vulnerabilities

23 October 2004

xpdf vulnerabilities

Releases

Details

Chris Evans discovered several integer overflow vulnerabilities in xpdf, a
viewer for PDF files. The Common UNIX Printing System (CUPS) also uses the
same code to print PDF files. In either case, these vulnerabilities could
be exploited by an attacker by providing a specially crafted PDF file which,
when processed by CUPS or xpdf, could result in abnormal program termination
or the execution of program code supplied by the attacker.

In the case of CUPS, this bug could be exploited to gain the privileges of
the CUPS print server (by default, user cupsys).

In the case of xpdf, this bug could be exploited to gain the privileges of
the user invoking xpdf.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 4.10
  • cupsys -
  • xpdf-utils -
  • xpdf-reader -

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-14-1: xpdf-reader, tetex-bin, xpdf-utils, cupsys