DSA-1509-1 koffice -- multiple vulnerabilities

Related Vulnerabilities: CVE-2007-4352   CVE-2007-5392   CVE-2007-5393  

Several vulnerabilities have been discovered in xpdf code that is embedded in koffice, an integrated office suite for KDE. These flaws could allow an attacker to execute arbitrary code by inducing the user to import a specially crafted PDF document. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-4352 Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file. CVE-2007-5392 Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow. CVE-2007-5393 Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter. Updates for the old stable distribution (sarge) will be made available as soon as possible. For the stable distribution (etch), these problems have been fixed in version 1:1.6.1-2etch2. We recommend that you upgrade your koffice package.

Debian Security Advisory

DSA-1509-1 koffice -- multiple vulnerabilities

Date Reported:
25 Feb 2008
Affected Packages:
koffice
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-4352, CVE-2007-5392, CVE-2007-5393.
More information:

Several vulnerabilities have been discovered in xpdf code that is embedded in koffice, an integrated office suite for KDE. These flaws could allow an attacker to execute arbitrary code by inducing the user to import a specially crafted PDF document. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-4352

    Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

  • CVE-2007-5392

    Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

  • CVE-2007-5393

    Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.

Updates for the old stable distribution (sarge) will be made available as soon as possible.

For the stable distribution (etch), these problems have been fixed in version 1:1.6.1-2etch4.

We recommend that you upgrade your koffice package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/k/koffice/koffice_1.6.1.orig.tar.gz
http://security.debian.org/pool/updates/main/k/koffice/koffice_1.6.1-2etch4.diff.gz
http://security.debian.org/pool/updates/main/k/koffice/koffice_1.6.1-2etch4.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/k/koffice/koffice-data_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/kword-data_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio-data_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-doc_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-doc-html_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter-data_1.6.1-2etch4_all.deb
http://security.debian.org/pool/updates/main/k/koffice/krita-data_1.6.1-2etch4_all.deb
Alpha:
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_amd64.deb
HP Precision:
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_i386.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_i386.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_mips.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_mips.deb
PowerPC:
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_s390.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/k/koffice/kpresenter_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kexi_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/krita_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kchart_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kugar_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kspread_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kword_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kformula_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-libs_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kivio_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/karbon_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/koshell_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dev_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/koffice-dbg_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kplato_1.6.1-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/k/koffice/kthesaurus_1.6.1-2etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.