lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070805200524.GA15362@galadriel.inutil.org>
Date: Sun, 5 Aug 2007 22:05:24 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1349-1] New libextractor packages fix arbitrary code execution

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1349-1                    security@...ian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
August 5th, 2007                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libextractor
Vulnerability  : integer overflow
Problem type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2007-3387

It was discovered that an integer overflow in the xpdf PDF viewer may lead
to the execution of arbitrary code if a malformed PDF file is opened.

libextractor includes a copy of the xpdf code and required an update
as well.

For the oldstable distribution (sarge) this problem has been fixed in
version 0.4.2-2sarge6.

The stable distribution (etch) isn't affected by this problem.

The unstable distribution (sid) isn't affected by this problem.

We recommend that you upgrade your libextractor packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge6.dsc
      Size/MD5 checksum:      778 fbcbd62c772674dc96a26373e5aa6e01
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge6.diff.gz
      Size/MD5 checksum:     9063 bb026f68189fd93686e5fd94b6cda88e
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2.orig.tar.gz
      Size/MD5 checksum:  5887095 d99e1b13a017d39700e376a0edbf7ba2

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_alpha.deb
      Size/MD5 checksum:    19690 01b435b2688d03f3459c79526954925c
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_alpha.deb
      Size/MD5 checksum:  5810714 dd23f39e0b388296b1fc271739712ebe
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_alpha.deb
      Size/MD5 checksum:    19484 7f05a34e53fd43830028912e14d2328f

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_amd64.deb
      Size/MD5 checksum:    18346 b0630efe8af750547c51f18e2b37e56c
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_amd64.deb
      Size/MD5 checksum:  5641608 6cc4c3570ed2c3319944d2dadeb32df2
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_amd64.deb
      Size/MD5 checksum:    17618 b03292795065cdd0c9444343f216a058

  ARM architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_arm.deb
      Size/MD5 checksum:    17726 b7d8e767fdec15d9f1dd42a4d287d093
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_arm.deb
      Size/MD5 checksum:  5710926 010de9d5ca245ecde20850f2077ec525
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_arm.deb
      Size/MD5 checksum:    17034 70da5564ca690372c8ff2f920e3145e7

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_i386.deb
      Size/MD5 checksum:    17870 34c81aebd99358f6a6668e6a6e766dcf
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_i386.deb
      Size/MD5 checksum:  5713546 59647b99f778803ae7dd04b8a3ef4f69
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_i386.deb
      Size/MD5 checksum:    16796 f6a61702be519be0de6ba5254a8d2bc1

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_ia64.deb
      Size/MD5 checksum:    20664 abbab8aca9823e749ce8f56ba180605a
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_ia64.deb
      Size/MD5 checksum:  5905678 6c4fae9ee6f98f8a2b04dfc8bb1e6c77
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_ia64.deb
      Size/MD5 checksum:    19402 7217989cd00aa203703636a12b73ef1c

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_m68k.deb
      Size/MD5 checksum:    17432 ad4ed814052b2b16a980916e8c26b4d5
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_m68k.deb
      Size/MD5 checksum:  5708490 4456e64e983995cdaada1b8003b87de9
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_m68k.deb
      Size/MD5 checksum:    16664 8d0a17ffea00ef3a8dd84ad1ef751382

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_mips.deb
      Size/MD5 checksum:    18672 ca896e1b783faaa7fd4f0b16bd5b679f
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_mips.deb
      Size/MD5 checksum:  5729468 b4369a7e90e9378aaf16c22e6ee8ba23
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_mips.deb
      Size/MD5 checksum:    17960 adf6c5dadd298f2cbfb129b329cbd396

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_mipsel.deb
      Size/MD5 checksum:    18720 24b4c8c7394ca7600b5d56ff6756ced0
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_mipsel.deb
      Size/MD5 checksum:  5727182 0d3c4b40711cd5ff424d9c3509abc959
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_mipsel.deb
      Size/MD5 checksum:    17990 2bfd506c4227ba2b51128ed229d05737

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_powerpc.deb
      Size/MD5 checksum:    19840 965842771a493480a596d23219240384
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_powerpc.deb
      Size/MD5 checksum:  5678172 d9b4e7d752db6ca53ce6adddd1c8963b
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_powerpc.deb
      Size/MD5 checksum:    17802 9d4275a87460db16bf31e112f8a7be72

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_s390.deb
      Size/MD5 checksum:    18220 218a8b4f648ee49543981dd7a418a86b
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_s390.deb
      Size/MD5 checksum:  5768298 367428e42de8d1af622d02d64f4fb027
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_s390.deb
      Size/MD5 checksum:    18166 98cb43003a7a95dbfd121cf615f73bc8

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_sparc.deb
      Size/MD5 checksum:    17728 f9220d2e7654b273448c0880374f59d4
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_sparc.deb
      Size/MD5 checksum:  5752498 5c5bcdf9c749506310e95137ae80550c
    http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_sparc.deb
      Size/MD5 checksum:    16938 b90780181aeb323dbcc4dfa11db7bcd0


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGti0iXm3vHE4uyloRAoudAJ9ZqS25gbz6VNY/oanVFFjCTMAm6QCgqNhx
XHBRb5puYoKnbq+YL58W5Jc=
=/7L0
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ