MDKSA-2003:071-1 - Updated xpdf packages fix arbitrary code execution vulnerability

From: Mandrake Linux Security Team (security_at_linux-mandrake.com)
Date: 07/24/03

  • Next message: Thor Larholm: "RE: Drivial Pursuit: Internet Explorer Browser & Your Files and Folders !"
    Date: 24 Jul 2003 02:24:31 -0000
    To: bugtraq@securityfocus.com
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    ________________________________________________________________________

                    Mandrake Linux Security Update Advisory
    ________________________________________________________________________

    Package name: xpdf
    Advisory ID: MDKSA-2003:071-1
    Date: July 23rd, 2003
    Original Advisory Date: June 27th, 2003
    Affected versions: 9.0, 9.1, Corporate Server 2.1
    ________________________________________________________________________

    Problem Description:

     Martyn Gilmore discovered flaws in various PDF viewers, including xpdf.
     An attacker could place malicious external hyperlinks in a document
     that, if followed, could execute arbitary shell commands with the
     privileges of the person viewing the PDF document.
      
    Update:

     New packages are available as the previous patches that had been
     applied did not correct all possible ways of exploiting this issue.
    ________________________________________________________________________

    References:
      
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0434
    ________________________________________________________________________

    Updated Packages:
      
     Corporate Server 2.1:
     12939cf7ca98085acc4f6ba5d741a8c6 corporate/2.1/RPMS/xpdf-1.01-4.3mdk.i586.rpm
     1a9bdf930d450c8b7f506d987805aa42 corporate/2.1/SRPMS/xpdf-1.01-4.3mdk.src.rpm

     Corporate Server 2.1/x86_64:
     5f22b8c7e2a03f4ad1d452b23348c967 x86_64/corporate/2.1/RPMS/xpdf-1.01-4.3mdk.x86_64.rpm
     1a9bdf930d450c8b7f506d987805aa42 x86_64/corporate/2.1/SRPMS/xpdf-1.01-4.3mdk.src.rpm

     Mandrake Linux 9.0:
     12939cf7ca98085acc4f6ba5d741a8c6 9.0/RPMS/xpdf-1.01-4.3mdk.i586.rpm
     1a9bdf930d450c8b7f506d987805aa42 9.0/SRPMS/xpdf-1.01-4.3mdk.src.rpm

     Mandrake Linux 9.1:
     6f95f03b679a5e834ce8e19f440ebeed 9.1/RPMS/xpdf-2.01-2.2mdk.i586.rpm
     cfe1fa4745fd0ab9488bc7490ba8919e 9.1/SRPMS/xpdf-2.01-2.2mdk.src.rpm

     Mandrake Linux 9.1/PPC:
     e4648afe258244c0bb59ecc533478816 ppc/9.1/RPMS/xpdf-2.01-2.2mdk.ppc.rpm
     cfe1fa4745fd0ab9488bc7490ba8919e ppc/9.1/SRPMS/xpdf-2.01-2.2mdk.src.rpm
    ________________________________________________________________________

    Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
    ________________________________________________________________________

    To upgrade automatically, use MandrakeUpdate or urpmi. The verification
    of md5 checksums and GPG signatures is performed automatically for you.

    A list of FTP mirrors can be obtained from:

      http://www.mandrakesecure.net/en/ftp.php

    All packages are signed by MandrakeSoft for security. You can obtain
    the GPG public key of the Mandrake Linux Security Team by executing:

      gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

    Please be aware that sometimes it takes the mirrors a few hours to
    update.

    You can view other update advisories for Mandrake Linux at:

      http://www.mandrakesecure.net/en/advisories/

    MandrakeSoft has several security-related mailing list services that
    anyone can subscribe to. Information on these lists can be obtained by
    visiting:

      http://www.mandrakesecure.net/en/mlist.php

    If you want to report vulnerabilities, please contact

      security_linux-mandrake.com

    Type Bits/KeyID Date User ID
    pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)

    iD8DBQE/H0NfmqjQ0CJFipgRAgL8AJ0ThTDDOPSyy7MV2p81DQp9XH2V4QCePwTO
    RgLct/gvLJJu+NlaKOZpI74=
    =Fw1r
    -----END PGP SIGNATURE-----


  • Next message: Thor Larholm: "RE: Drivial Pursuit: Internet Explorer Browser & Your Files and Folders !"

    Relevant Pages

    • [Full-Disclosure] MDKSA-2003:071-1 - Updated xpdf packages fix arbitrary code execution vulnerabilit
      ... Original Advisory Date: June 27th, ... Martyn Gilmore discovered flaws in various PDF viewers, ... Mandrake Linux 9.0: ... All packages are signed by MandrakeSoft for security. ...
      (Full-Disclosure)
    • MDKSA-2002:016-1 - squid update
      ... Three security issues were found in the 2.x versions of the Squid proxy ... Denial of Service attack on ther server if the SNMP interface is ... The squid updates for all versions other than Mandrake Linux were ... All packages are signed by MandrakeSoft for security. ...
      (Bugtraq)
    • [Security Announce] MDKSA-2001:086 - tetex update
      ... of some teTeX filters by zen-parse. ... You can get the GPG public key of the Mandrake Linux Security Team at ... of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". ...
      (Bugtraq)
    • MDKSA-2001:069 - openldap update
      ... CERT released an advisory that details a number of vulnerabilities as ... You can get the GPG public key of the Mandrake Linux Security Team at ... of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". ...
      (Bugtraq)
    • MDKSA-2001:053-1 - gnupg update
      ... A format string vulnerability exists in gnupg 1.0.5 and previous ... You can get the GPG public key of the Linux-Mandrake Security Team at ... Mandrake Linux 8.0: ...
      (Bugtraq)