xpdf: Buffer overflow vulnerability in Splash.cc; CVE-2006-0301

Related Vulnerabilities: CVE-2006-0301  

Debian Bug report logs - #350783
xpdf: Buffer overflow vulnerability in Splash.cc; CVE-2006-0301

version graph

Package: xpdf-reader; Maintainer for xpdf-reader is (unknown);

Reported by: Jan Niehusmann <jan@gondor.com>

Date: Tue, 31 Jan 2006 20:33:01 UTC

Severity: grave

Tags: security

Found in version xpdf-reader/3.01-5

Fixed in version xpdf/3.01-6

Done: Hamish Moffatt <hamish@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Hamish Moffatt <hamish@debian.org>:
Bug#350783; Package xpdf-reader. (full text, mbox, link).


Acknowledgement sent to Jan Niehusmann <jan@gondor.com>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Hamish Moffatt <hamish@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Jan Niehusmann <jan@gondor.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: xpdf: Buffer overflow vulnerability in Splash.cc; CVE-2006-0301
Date: Tue, 31 Jan 2006 21:13:31 +0100
Package: xpdf-reader
Version: 3.01-5
Severity: grave
Tags: security
Justification: user security hole

xpdf is probably vulnerable due to the bug described in
http://www.frsirt.com/english/advisories/2006/0389
(I didn't actually check if it's really vulnerable - but I guess it is)

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'oldstable'), (500, 'testing'), (500, 'stable'), (101, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-rc1-ge066d9a8-dirty
Locale: LANG=C, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)

Versions of packages xpdf depends on:
ii  xpdf-common                   3.01-5     Portable Document Format (PDF) sui
ii  xpdf-reader                   3.01-5     Portable Document Format (PDF) sui
ii  xpdf-utils                    3.01-5     Portable Document Format (PDF) sui

xpdf recommends no packages.

Versions of packages xpdf-reader depends on:
ii  gsfonts               8.14+v8.11+urw-0.2 Fonts for the Ghostscript interpre
ii  lesstif2              1:0.94.4-1.1       OSF/Motif 2.1 implementation relea
ii  libc6                 2.3.5-12           GNU C Library: Shared libraries an
ii  libfreetype6          2.1.10-1           FreeType 2 font engine, shared lib
ii  libgcc1               1:4.0.2-8          GCC support library
ii  libice6               6.9.0.dfsg.1-4     Inter-Client Exchange library
ii  libpaper1             1.1.14-5           Library for handling paper charact
ii  libsm6                6.9.0.dfsg.1-4     X Window System Session Management
ii  libstdc++6            4.0.2-8            The GNU Standard C++ Library v3
ii  libt1-5               5.1.0-2            Type 1 font rasterizer library - r
ii  libx11-6              6.9.0.dfsg.1-4     X Window System protocol client li
ii  libxext6              6.9.0.dfsg.1-4     X Window System miscellaneous exte
ii  libxp6                6.9.0.dfsg.1-4     X Window System printing extension
ii  libxpm4               6.9.0.dfsg.1-4     X pixmap library
ii  libxt6                6.9.0.dfsg.1-4     X Toolkit Intrinsics
ii  xpdf-common           3.01-5             Portable Document Format (PDF) sui
ii  zlib1g                1:1.2.3-9          compression library - runtime

-- no debconf information



Reply sent to Hamish Moffatt <hamish@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Jan Niehusmann <jan@gondor.com>:
Bug acknowledged by developer. (full text, mbox, link).


Message #10 received at 350783-close@bugs.debian.org (full text, mbox, reply):

From: Hamish Moffatt <hamish@debian.org>
To: 350783-close@bugs.debian.org
Subject: Bug#350783: fixed in xpdf 3.01-6
Date: Wed, 01 Feb 2006 02:32:12 -0800
Source: xpdf
Source-Version: 3.01-6

We believe that the bug you reported is fixed in the latest version of
xpdf, which is due to be installed in the Debian FTP archive:

xpdf-common_3.01-6_all.deb
  to pool/main/x/xpdf/xpdf-common_3.01-6_all.deb
xpdf-reader_3.01-6_i386.deb
  to pool/main/x/xpdf/xpdf-reader_3.01-6_i386.deb
xpdf-utils_3.01-6_i386.deb
  to pool/main/x/xpdf/xpdf-utils_3.01-6_i386.deb
xpdf_3.01-6.diff.gz
  to pool/main/x/xpdf/xpdf_3.01-6.diff.gz
xpdf_3.01-6.dsc
  to pool/main/x/xpdf/xpdf_3.01-6.dsc
xpdf_3.01-6_all.deb
  to pool/main/x/xpdf/xpdf_3.01-6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 350783@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hamish Moffatt <hamish@debian.org> (supplier of updated xpdf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  1 Feb 2006 22:42:42 +1300
Source: xpdf
Binary: xpdf-utils xpdf xpdf-reader xpdf-common
Architecture: source i386 all
Version: 3.01-6
Distribution: unstable
Urgency: high
Maintainer: Hamish Moffatt <hamish@debian.org>
Changed-By: Hamish Moffatt <hamish@debian.org>
Description: 
 xpdf       - Portable Document Format (PDF) suite
 xpdf-common - Portable Document Format (PDF) suite -- common files
 xpdf-reader - Portable Document Format (PDF) suite -- viewer for X11
 xpdf-utils - Portable Document Format (PDF) suite -- utilities
Closes: 350783 350785
Changes: 
 xpdf (3.01-6) unstable; urgency=high
 .
   * SECURITY UPDATE: fixed buffer overflow in splash image handling
     (Splash/splash.cc) using patch supplied by Red Hat:
     https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
     (closes: #350785, #350783)
   * References: CVE-2006-0301
   * My first upload from the side of the road on borrowed wifi
     in a foreign country...
Files: 
 4f1e328b54761f3341951033632dbf0c 1096 text optional xpdf_3.01-6.dsc
 99c84b07a0dba4ddf757b5f5624d0f8b 31276 text optional xpdf_3.01-6.diff.gz
 0500b4aac7c4643c9027ccecc00750f8 1268 text optional xpdf_3.01-6_all.deb
 c76392b45d3938bac1d2ee071d6ad5da 60400 text optional xpdf-common_3.01-6_all.deb
 128f26ff7d538eb0d1c9acbf68ec62d0 770348 text optional xpdf-reader_3.01-6_i386.deb
 aa57363855941790ec8941073ae18655 1400174 text optional xpdf-utils_3.01-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQCVAwUBQ+CJ5tiYIdPvprnVAQJOfQQAmSgPRY+DO5lSzw7IGGqeTAyakRlN+ska
1aJYVO63AcEmySwgrpbvewgct4gav8GZ4Exh4Xfojis+DPMtveDdgPZ2mEZjCGdZ
Rjeqo2BUYlWUBqfDZQ5mBbX1V35oviuvZrEEgsz2TzSFxEChdWfcJW71GUD2V4wp
1P3SIiFrO4w=
=2J4a
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 26 Jun 2007 20:11:55 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:32:16 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.