[UNIX] KGhostView Arbitrary Code ExecutionFrom: firstname.lastname@example.org
- Previous message: email@example.com: "[UNIX] Syslog-NG Buffer Overflow"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com Date: 12 Oct 2002 16:16:48 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
KGhostView Arbitrary Code Execution
KGhostView includes a DSC 3.0 parser from GSview, which is vulnerable to a
buffer overflow while parsing a specially crafted .ps input file. It also
contains code from gv 3.5.x which is vulnerable to another buffer overflow
triggered by malformed postscript or Adobe PDF files.
* KGhostView of any KDE release between KDE 1.1 and KDE 3.0.3a
Viewing certain Postscript or PDF files can result in the execution of
arbitrary code placed in the file and as a result opens possibilities for
any remote manipulation under the local user account.
Apply the patch listed in section 5 to kdegraphics/kghostview, or update
to KDE 3.0.4.
A patch for KDE 3.0.3 is available from
A patch for KDE 2.2.2 is available from
The information has been provided by <mailto:firstname.lastname@example.org> Dirk
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.