TITLE: Xpdf Multiple Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA17897 VERIFY ADVISORY: http://secunia.com/advisories/17897/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Xpdf 3.x http://secunia.com/product/4128/ DESCRIPTION: infamous41md has reported some vulnerabilities in xpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. 1) A boundary error exists in the "DCTStream::readBaselineSOF()" function in "xpdf/Stream.cc" when copying data from a PDF file to a heap-based buffer. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file with an overly large "numComps" value. 2) A boundary error exists in the "DCTStream::readProgressiveSOF()" function in "xpdf/Stream.cc" when copying data from a PDF file to a heap-based buffer. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file with an overly large "numComps" value. 3) An error exists in the "StreamPredictor::StreamPredictor()" function in "xpdf/Stream.cc" when using the "numComps" value to calculate the memory size to be allocated by "gmalloc()". This can be exploited to cause "gmalloc()" to allocate less memory than required, which will lead to a heap-based buffer overflow when data is copied from the PDF file to the allocated memory. 4) An error exists in the "JPXStream::readCodestream()" function in "xpdf/JPXStream.cc" when using the "nXTiles" and "nYTiles" values from a PDF file to copy data from the file into allocated memory. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file with overly large "nXTiles" and "nYTiles" values. Successful exploitation of the vulnerabilities requires that the user is e.g. tricked into opening a malicious PDF file. The vulnerabilities have been reported in version 3.01. Prior versions may also be affected. SOLUTION: Update to version 3.01pl1. http://www.foolabs.com/xpdf/download.html PROVIDED AND/OR DISCOVERED BY: infamous41md ORIGINAL ADVISORY: iDEFENSE: http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------