Alerta de Segurança Debian

DSA-222-1 xpdf -- Overflow de Inteiros

Data do Alerta:
06 Jan 2003
Pacotes Afetados:
xpdf
Vulnerável:
Sim
Referência à base de dados de segurança:
Na base de dados do BugTraq (na SecurityFocus): ID BugTraq 6475.
No dicionário CVE do Mitre: CVE-2002-1384.
Informações adicionais:

O iDEFENSE descobriu um overflow de inteiro no filtro pdftops do pacote xpdf que pode ser explorado para obter privilégios do usuário alvo. Isso pode levar a obtenção de acesso não autorizado ao usuário 'lp' se o programa pdftops for parte do filtro de impressão.

Para a atual distribuição estável (woody) esse problema foi corrigido na versão 1.00-3.1.

Para a antiga distribuição estável (potato) esse problema foi corrigido na versão 0.90-8.1.

Para a distribuição instável (sid) esse problema foi corrigido na versão 2.01-2.

Nós recomendamos que você atualize seu pacote xpdf.

Corrigido em:

Debian GNU/Linux 2.2 (potato)

Fonte:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1.dsc
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1.diff.gz
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_i386.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_powerpc.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_0.90-8.1_sparc.deb

Debian GNU/Linux 3.0 (woody)

Fonte:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.1.dsc
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.1.diff.gz
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00.orig.tar.gz
Componente independente de arquitetura:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_1.00-3.1_all.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.1_all.deb
Alpha:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_alpha.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_arm.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_i386.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_ia64.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_hppa.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_m68k.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_mips.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_mipsel.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_powerpc.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_s390.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.1_sparc.deb
http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.1_sparc.deb

Checksums MD5 dos arquivos listados estão disponíveis no alerta original.