SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xpdf Vendors:   Glyph and Cog
(Red Hat Issues Fix) Xpdf Large Temporary Files May Let Remote Users Cause Denial of Service Conditions
SecurityTracker Alert ID:  1014647
SecurityTracker URL:  http://securitytracker.com/id/1014647
CVE Reference:   CVE-2005-2097   (Links to External Site)
Date:  Aug 10 2005
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.00pl3 and prior versions
Description:   A vulnerability was reported in Xpdf. A user can cause denial of service conditions.

A remote user can supply a specially crafted PDF file that, when processed by Xpdf, will fill up all available disk space. As a result, denial of service conditions may occur.

The xpdf code can be made to write a temporary file in the temporary directory that is large enough to fill up the available disk space.

Impact:   A local or remote user can create a file that, when processed using Xpdf, will consume all available disk space on the target system.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244 xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406 xpdf-3.00-11.8.ia64.rpm

ppc:
a7b363839ba04fe12b2f2f26d7bf86c6 xpdf-3.00-11.8.ppc.rpm

s390:
711b388ba7cd77eced5055b8963cd85a xpdf-3.00-11.8.s390.rpm

s390x:
a7e5d1f17050507f015ed8f9960b4db4 xpdf-3.00-11.8.s390x.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867 xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244 xpdf-3.00-11.8.i386.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867 xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244 xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406 xpdf-3.00-11.8.ia64.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867 xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244 xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406 xpdf-3.00-11.8.ia64.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867 xpdf-3.00-11.8.x86_64.rpm

Vendor URL:  www.foolabs.com/xpdf/ (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Aug 10 2005 Xpdf Large Temporary Files May Let Remote Users Cause Denial of Service Conditions



 Source Message Contents

Subject:  [RHSA-2005:670-01] Moderate: xpdf security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: xpdf security update
Advisory ID:       RHSA-2005:670-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-670.html
Issue date:        2005-08-09
Updated on:        2005-08-09
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-2097
- ---------------------------------------------------------------------

1. Summary:

An updated xpdf package that fixes a security issue is now available for
Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The xpdf package is an X Window System-based viewer for Portable Document
Format (PDF) files.

A flaw was discovered in Xpdf in that an attacker could construct a
carefully crafted PDF file that would cause Xpdf to consume all available
disk space in /tmp when opened. The Common Vulnerabilities and Exposures
project assigned the name CAN-2005-2097 to this issue.

Note this issue does not affect the version of Xpdf in Red Hat Enterprise
Linux 3 or 2.1.

Users of xpdf should upgrade to this updated package, which contains a
backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

163918 - CAN-2005-2097 xpdf DoS


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c  xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244  xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406  xpdf-3.00-11.8.ia64.rpm

ppc:
a7b363839ba04fe12b2f2f26d7bf86c6  xpdf-3.00-11.8.ppc.rpm

s390:
711b388ba7cd77eced5055b8963cd85a  xpdf-3.00-11.8.s390.rpm

s390x:
a7e5d1f17050507f015ed8f9960b4db4  xpdf-3.00-11.8.s390x.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867  xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c  xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244  xpdf-3.00-11.8.i386.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867  xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c  xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244  xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406  xpdf-3.00-11.8.ia64.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867  xpdf-3.00-11.8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-11.8.src.rpm
d240eb91ed91898d1285f1b03738830c  xpdf-3.00-11.8.src.rpm

i386:
857ffad14cc068f9f8df520c7cfe4244  xpdf-3.00-11.8.i386.rpm

ia64:
ce1db852d78a52c46fae89854717f406  xpdf-3.00-11.8.ia64.rpm

x86_64:
ea5eecf2b5cde55196ad66c3e2713867  xpdf-3.00-11.8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFC+OBUXlSAg2UNWIIRAodrAJ9QGQX50J1Ara/+q4lpOIX2Q0MqvwCghiDs
O8ailA8IsUkd5gyXPbHsJzg=
=kRnl
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC