summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200710-20.xml
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
committerV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
commit4f2d7949f03e1c198bc888f2d05f421d35c57e21 (patch)
treeba5f07bf3f9d22d82e54a462313f5d244036c768 /metadata/glsa/glsa-200710-20.xml
reinit the tree, so we can have metadata
Diffstat (limited to 'metadata/glsa/glsa-200710-20.xml')
-rw-r--r--metadata/glsa/glsa-200710-20.xml77
1 files changed, 77 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200710-20.xml b/metadata/glsa/glsa-200710-20.xml
new file mode 100644
index 000000000000..9dbe48f0f7f8
--- /dev/null
+++ b/metadata/glsa/glsa-200710-20.xml
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="200710-20">
+ <title>PDFKit, ImageKits: Buffer overflow</title>
+ <synopsis>
+ PDFKit and ImageKits are vulnerable to an integer overflow and a stack
+ overflow allowing for the user-assisted execution of arbitrary code.
+ </synopsis>
+ <product type="ebuild">pdfkit imagekits</product>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
+ <bug>188185</bug>
+ <access>remote</access>
+ <affected>
+ <package name="gnustep-libs/pdfkit" auto="yes" arch="*">
+ <vulnerable range="le">0.9_pre062906</vulnerable>
+ </package>
+ <package name="gnustep-libs/imagekits" auto="yes" arch="*">
+ <vulnerable range="le">0.6</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>
+ PDFKit is a framework for rendering of PDF content in GNUstep
+ applications. ImageKits is a collection of frameworks to support
+ imaging in GNUstep applications.
+ </p>
+ </background>
+ <description>
+ <p>
+ Maurycy Prodeus discovered an integer overflow vulnerability possibly
+ leading to a stack-based buffer overflow in the XPDF code which PDFKit
+ is based on. ImageKits also contains a copy of PDFKit.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>
+ By enticing a user to view a specially crafted PDF file with a viewer
+ based on ImageKits or PDFKit such as Gentoo's ViewPDF, a remote
+ attacker could cause an overflow, potentially resulting in the
+ execution of arbitrary code with the privileges of the user running the
+ application.
+ </p>
+ </impact>
+ <workaround>
+ <p>
+ There is no known workaround at this time.
+ </p>
+ </workaround>
+ <resolution>
+ <p>
+ PDFKit and ImageKits are not maintained upstream, so the packages were
+ masked in Portage. We recommend that users unmerge PDFKit and
+ ImageKits:
+ </p>
+ <code>
+ # emerge --unmerge gnustep-libs/pdfkit
+ # emerge --unmerge gnustep-libs/imagekits</code>
+ <p>
+ As an alternative, users should upgrade their systems to use PopplerKit
+ instead of PDFKit and Vindaloo instead of ViewPDF.
+ </p>
+ </resolution>
+ <references>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ </references>
+ <metadata tag="requester" timestamp="2007-10-02T21:24:54Z">
+ falco
+ </metadata>
+ <metadata tag="submitter" timestamp="2007-10-07T23:31:24Z">
+ rbu
+ </metadata>
+ <metadata tag="bugReady" timestamp="2007-10-09T18:28:10Z">
+ p-y
+ </metadata>
+</glsa>