Lucene search

K
gentooGentoo FoundationGLSA-200803-17
HistoryMar 10, 2008 - 12:00 a.m.

PDFlib: Multiple buffer overflows

2008-03-1000:00:00
Gentoo Foundation
security.gentoo.org
31

CVSS2

5.7

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.181

Percentile

96.3%

Background

PDFlib is a library for generating PDF on the fly.

Description

poplix reported multiple boundary errors in the pdc_fsearch_fopen() function when processing overly long filenames.

Impact

A remote attacker could send specially crafted content to a vulnerable application using PDFlib, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All PDFlib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/pdflib-7.0.2_p8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/pdflib< 7.0.2_p8UNKNOWN

CVSS2

5.7

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.181

Percentile

96.3%