[UNIX] KGhostView Arbitrary Code Execution

From: support@securiteam.com
Date: 10/12/02


From: support@securiteam.com
To: list@securiteam.com
Date: 12 Oct 2002 16:16:48 +0200

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  KGhostView Arbitrary Code Execution
------------------------------------------------------------------------

SUMMARY

KGhostView includes a DSC 3.0 parser from GSview, which is vulnerable to a
buffer overflow while parsing a specially crafted .ps input file. It also
contains code from gv 3.5.x which is vulnerable to another buffer overflow
triggered by malformed postscript or Adobe PDF files.

DETAILS

Vulnerable systems:
 * KGhostView of any KDE release between KDE 1.1 and KDE 3.0.3a

Impact:
Viewing certain Postscript or PDF files can result in the execution of
arbitrary code placed in the file and as a result opens possibilities for
any remote manipulation under the local user account.

Solution:
Apply the patch listed in section 5 to kdegraphics/kghostview, or update
to KDE 3.0.4.

kdegraphics-3.0.4 can be downloaded from
<http://download.kde.org/stable/3.0.4>
http://download.kde.org/stable/3.0.4 : 6065219c825102c843ba582c4a520cac
kdegraphics-3.0.4.tar.bz2

Patch:
A patch for KDE 3.0.3 is available from
<ftp://ftp.kde.org/pub/kde/security_patches>
ftp://ftp.kde.org/pub/kde/security_patches :
9e33962406ac123e4fbdab20b4123ccf post-3.0.3-kdegraphics-kghostview.diff

A patch for KDE 2.2.2 is available from
<ftp://ftp.kde.org/pub/kde/security_patches>
ftp://ftp.kde.org/pub/kde/security_patches :
62a1178c6a1730cbab98bbc825adafe9 post-2.2.2-kdegraphics-kghostview.diff

ADDITIONAL INFORMATION

The information has been provided by <mailto:mueller@kde.org> Dirk
Mueller.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.