USN-236-2: xpdf vulnerabilities in kword, kpdf
9 January 2006
xpdf vulnerabilities in kword, kpdf
Releases
Details
USN-236-1 fixed several vulnerabilities in xpdf. kpdf and kword
contain copies of xpdf code and are thus vulnerable to the same
issues.
For reference, this is the original advisory:
Chris Evans discovered several integer overflows in the XPDF code,
which is present in xpdf, the Poppler library, and tetex-bin. By
tricking an user into opening a specially crafted PDF file, an
attacker could exploit this to execute arbitrary code with the
privileges of the application that processes the document.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.10
-
kword
-
-
kpdf
-
Ubuntu 5.04
-
kword
-
-
kpdf
-
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-236-1: cupsys, libpoppler0c2, xpdf-utils, tetex-bin, xpdf-reader