USN-2-1: xpdf vulnerabilities

Publication date

23 October 2004

Overview

xpdf vulnerabilities

Releases


Details

Chris Evans discovered several integer overflow vulnerabilities in xpdf, a
viewer for PDF files. The Common UNIX Printing System (CUPS) also uses the
same code to print PDF files. In either case, these vulnerabilities could
be exploited by an attacker by providing a specially crafted PDF file which,
when processed by CUPS or xpdf, could result in abnormal program termination
or the execution of program code supplied by the attacker.

In the case of CUPS, this bug could be exploited to gain the privileges of
the CUPS print server (by default, user cupsys).

In the case of xpdf, this bug could be exploited to gain the privileges of
the user invoking xpdf.

Chris Evans discovered several integer overflow vulnerabilities in xpdf, a
viewer for PDF files. The Common UNIX Printing System (CUPS) also uses the
same code to print PDF files. In either case, these vulnerabilities could
be exploited by an attacker by providing a specially crafted PDF file which,
when processed by CUPS or xpdf, could result in abnormal program termination
or the execution of program code supplied by the attacker.

In the case of CUPS, this bug could be exploited to gain the privileges of
the CUPS print server (by default, user cupsys).

In the case of xpdf, this bug could be exploited to gain the privileges of
the user invoking xpdf.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
4.10 warty cupsys – 
xpdf-utils – 
xpdf-reader – 

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›