Okular: Arbitrary code execution

2013-11-28T00:00:00
ID GLSA-201311-20
Type gentoo
Reporter Gentoo Foundation
Modified 2013-11-28T00:00:00

Description

Background

Okular is a universal document viewer based on KPDF for KDE 4.

Description

Okular contains a heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp.

Impact

A remote attacker could entice a user to open a specially crafted PBD file using Okular, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Okular users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/okular-4.4.5-r2"