Lucene search

K
osvGoogleOSV:DSA-1509-1
HistoryFeb 25, 2008 - 12:00 a.m.

koffice - multiple vulnerabilities

2008-02-2500:00:00
Google
osv.dev
21

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

Several vulnerabilities have been discovered in xpdf code that is
embedded in koffice, an integrated office suite for KDE. These flaws
could allow an attacker to execute arbitrary code by inducing the user
to import a specially crafted PDF document. The Common Vulnerabilities and
Exposures project identifies the following problems:

  • CVE-2007-4352
    Array index error in the DCTStream::readProgressiveDataUnit method in
    xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice,
    CUPS, and other products, allows remote attackers to trigger memory
    corruption and execute arbitrary code via a crafted PDF file.
  • CVE-2007-5392
    Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in
    Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a
    crafted PDF file, resulting in a heap-based buffer overflow.
  • CVE-2007-5393
    Heap-based buffer overflow in the CCITTFaxStream::lookChar method in
    xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute
    arbitrary code via a PDF file that contains a crafted CCITTFaxDecode
    filter.

Updates for the old stable distribution (sarge) will be made available
as soon as possible.

For the stable distribution (etch), these problems have been fixed in version
1:1.6.1-2etch2.

We recommend that you upgrade your koffice package.

CPENameOperatorVersion
kofficeeq1:1.6.1-2etch1
kofficeeq1:1.6.1-2

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C