exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-229

Mandriva Linux Security Advisory 2010-229
Posted Nov 12, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-229 - The Gfx::getPos function in the PDF parser in kdegraphics, allows context-dependent attackers to cause a denial of service via unknown vectors that trigger an uninitialized pointer dereference. The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in kdegraphics, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2010-3702, CVE-2010-3704
SHA-256 | 0284f82e91807e1c0672171f87b87c2b401535241a197f83d996bf4d95e65c31

Mandriva Linux Security Advisory 2010-229

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:229
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kdegraphics
Date : November 12, 2010
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities were discovered and corrected in kdegraphics:

The Gfx::getPos function in the PDF parser in kdegraphics, allows
context-dependent attackers to cause a denial of service (crash)
via unknown vectors that trigger an uninitialized pointer dereference
(CVE-2010-3702).

The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser
in kdegraphics, allows context-dependent attackers to cause a denial
of service (crash) and possibly execute arbitrary code via a PDF
file with a crafted Type1 font that contains a negative array index,
which bypasses input validation and which triggers memory corruption
(CVE-2010-3704).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
ca7fc66407f8bce089a8cc674b19c151 corporate/4.0/i586/kdegraphics-3.5.4-0.12.20060mlcs4.i586.rpm
70cf8e941a95ebb7c29ebaf86f6fbf21 corporate/4.0/i586/kdegraphics-common-3.5.4-0.12.20060mlcs4.i586.rpm
e9ac44eca48479b959f8fe6fb95e08f0 corporate/4.0/i586/kdegraphics-kcolorchooser-3.5.4-0.12.20060mlcs4.i586.rpm
204ceb80cf1eb61d2bbff6980cde029f corporate/4.0/i586/kdegraphics-kcoloredit-3.5.4-0.12.20060mlcs4.i586.rpm
e36bc343ef8f1a5a1d65302d48b24d7c corporate/4.0/i586/kdegraphics-kdvi-3.5.4-0.12.20060mlcs4.i586.rpm
cb240518d43421152b6fecfc2569d3a5 corporate/4.0/i586/kdegraphics-kfax-3.5.4-0.12.20060mlcs4.i586.rpm
288498c8a2b49e0c52290eab2b385077 corporate/4.0/i586/kdegraphics-kghostview-3.5.4-0.12.20060mlcs4.i586.rpm
927d95e35dd24f4c2b2d9c51351ff53d corporate/4.0/i586/kdegraphics-kiconedit-3.5.4-0.12.20060mlcs4.i586.rpm
bae51eca43e42d5dea56a12e2244aaf7 corporate/4.0/i586/kdegraphics-kolourpaint-3.5.4-0.12.20060mlcs4.i586.rpm
c5f9dbf0787af4860e83e4012ff95414 corporate/4.0/i586/kdegraphics-kooka-3.5.4-0.12.20060mlcs4.i586.rpm
3f87017a2d2f48bb58b9416165c58c05 corporate/4.0/i586/kdegraphics-kpdf-3.5.4-0.12.20060mlcs4.i586.rpm
0fd23113ac80d598a89f540511e24391 corporate/4.0/i586/kdegraphics-kpovmodeler-3.5.4-0.12.20060mlcs4.i586.rpm
1679b176813d4cbd6f6985ec0802fd3f corporate/4.0/i586/kdegraphics-kruler-3.5.4-0.12.20060mlcs4.i586.rpm
f15ee25628500750a730ce92a0201a4c corporate/4.0/i586/kdegraphics-ksnapshot-3.5.4-0.12.20060mlcs4.i586.rpm
7914fbb235b36ca74b8e2d9a860abccc corporate/4.0/i586/kdegraphics-ksvg-3.5.4-0.12.20060mlcs4.i586.rpm
d3fc0dd097c42df72ecfc8fd2675343d corporate/4.0/i586/kdegraphics-kuickshow-3.5.4-0.12.20060mlcs4.i586.rpm
311455a89e5644a9851d4e8271a9e040 corporate/4.0/i586/kdegraphics-kview-3.5.4-0.12.20060mlcs4.i586.rpm
daf09d00ef74a95a8b900056860d666d corporate/4.0/i586/kdegraphics-mrmlsearch-3.5.4-0.12.20060mlcs4.i586.rpm
f5ffdde157c6812aedb93c7591ded12c corporate/4.0/i586/libkdegraphics0-common-3.5.4-0.12.20060mlcs4.i586.rpm
01b461e1751a15a52086501c2a5ed470 corporate/4.0/i586/libkdegraphics0-common-devel-3.5.4-0.12.20060mlcs4.i586.rpm
de7af69b690ab208a510dcc63a829e78 corporate/4.0/i586/libkdegraphics0-kghostview-3.5.4-0.12.20060mlcs4.i586.rpm
b049a34f035dc104969ae6bcf36f5fea corporate/4.0/i586/libkdegraphics0-kghostview-devel-3.5.4-0.12.20060mlcs4.i586.rpm
a22394fe4b115cd6440ce8ec49ae3f62 corporate/4.0/i586/libkdegraphics0-kooka-3.5.4-0.12.20060mlcs4.i586.rpm
181b757f32dc94a2812c8c001de3da3b corporate/4.0/i586/libkdegraphics0-kooka-devel-3.5.4-0.12.20060mlcs4.i586.rpm
5cb0455df62e6659b1f48d1867d67ac9 corporate/4.0/i586/libkdegraphics0-kpovmodeler-3.5.4-0.12.20060mlcs4.i586.rpm
9c05a10a32f9311e548c7c0d488e70ae corporate/4.0/i586/libkdegraphics0-kpovmodeler-devel-3.5.4-0.12.20060mlcs4.i586.rpm
5e2a5052e8cf52419c02684ed08f7a5f corporate/4.0/i586/libkdegraphics0-ksvg-3.5.4-0.12.20060mlcs4.i586.rpm
92f6b294a7b6047d3ffb63260b7e7a56 corporate/4.0/i586/libkdegraphics0-ksvg-devel-3.5.4-0.12.20060mlcs4.i586.rpm
246296dd53e92f43fbe399347777a76e corporate/4.0/i586/libkdegraphics0-kview-3.5.4-0.12.20060mlcs4.i586.rpm
66f77aeb07aa3880e6ea8a2ebe72cf35 corporate/4.0/i586/libkdegraphics0-kview-devel-3.5.4-0.12.20060mlcs4.i586.rpm
c9c2263610c4e435444af0d1106c6cf1 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.12.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
36a31767741bd50a3004702c8a0593f7 corporate/4.0/x86_64/kdegraphics-3.5.4-0.12.20060mlcs4.x86_64.rpm
bab9ffe58b658a83a26643a8eb663e55 corporate/4.0/x86_64/kdegraphics-common-3.5.4-0.12.20060mlcs4.x86_64.rpm
aca36f11bcc8512a03c63a2b045c1989 corporate/4.0/x86_64/kdegraphics-kcolorchooser-3.5.4-0.12.20060mlcs4.x86_64.rpm
2ebb73a245045a79a9e08d950fce8ebc corporate/4.0/x86_64/kdegraphics-kcoloredit-3.5.4-0.12.20060mlcs4.x86_64.rpm
b0310776b7781f97b861b85d08a7362d corporate/4.0/x86_64/kdegraphics-kdvi-3.5.4-0.12.20060mlcs4.x86_64.rpm
e246df26c4d8f4029265ea8c0d885f51 corporate/4.0/x86_64/kdegraphics-kfax-3.5.4-0.12.20060mlcs4.x86_64.rpm
e0df27e7686f643d040f3f637d0d4346 corporate/4.0/x86_64/kdegraphics-kghostview-3.5.4-0.12.20060mlcs4.x86_64.rpm
cb0b2a6e1f336705b4d181c5f81b1cd2 corporate/4.0/x86_64/kdegraphics-kiconedit-3.5.4-0.12.20060mlcs4.x86_64.rpm
5f3ee4587164dabbdcdeee61b4332d02 corporate/4.0/x86_64/kdegraphics-kolourpaint-3.5.4-0.12.20060mlcs4.x86_64.rpm
a64ef0630f8c48cd061dd86a2244f456 corporate/4.0/x86_64/kdegraphics-kooka-3.5.4-0.12.20060mlcs4.x86_64.rpm
276d87fb4e63586dd3fdf9d2374f2df1 corporate/4.0/x86_64/kdegraphics-kpdf-3.5.4-0.12.20060mlcs4.x86_64.rpm
d9576eb89f668d85d6ac195df3f3b3cf corporate/4.0/x86_64/kdegraphics-kpovmodeler-3.5.4-0.12.20060mlcs4.x86_64.rpm
7d703b1083e0d7830a137d68b6b87023 corporate/4.0/x86_64/kdegraphics-kruler-3.5.4-0.12.20060mlcs4.x86_64.rpm
441fe8501578b70c2f3d07aea5e2002d corporate/4.0/x86_64/kdegraphics-ksnapshot-3.5.4-0.12.20060mlcs4.x86_64.rpm
bf6eb39574f73c5e0d4799078d23e150 corporate/4.0/x86_64/kdegraphics-ksvg-3.5.4-0.12.20060mlcs4.x86_64.rpm
ec6df8fdc72776d7a6fab6ee800b37d0 corporate/4.0/x86_64/kdegraphics-kuickshow-3.5.4-0.12.20060mlcs4.x86_64.rpm
0c328ed02ff0c8cdb29dc4999fd822da corporate/4.0/x86_64/kdegraphics-kview-3.5.4-0.12.20060mlcs4.x86_64.rpm
e5180f6d7b5f5f62ffc2b124b3342a3b corporate/4.0/x86_64/kdegraphics-mrmlsearch-3.5.4-0.12.20060mlcs4.x86_64.rpm
ef3333ebf490da8a08536be2d6510d70 corporate/4.0/x86_64/lib64kdegraphics0-common-3.5.4-0.12.20060mlcs4.x86_64.rpm
f7b09a618f8c106f0a2c4219ddd80fbc corporate/4.0/x86_64/lib64kdegraphics0-common-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
c6ebaea536386e653f8553953616272b corporate/4.0/x86_64/lib64kdegraphics0-kghostview-3.5.4-0.12.20060mlcs4.x86_64.rpm
1c9ef7849ea4e7e4536f4c1f914f856b corporate/4.0/x86_64/lib64kdegraphics0-kghostview-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
5e541a891e0974820de0432fbd7f25e6 corporate/4.0/x86_64/lib64kdegraphics0-kooka-3.5.4-0.12.20060mlcs4.x86_64.rpm
b2ab7198cdba8e6fc36c6c7e98b812a0 corporate/4.0/x86_64/lib64kdegraphics0-kooka-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
c89418c553f375ea7466fba6cc49fc92 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-3.5.4-0.12.20060mlcs4.x86_64.rpm
67efa16aaf65bb405682c77d35c8b600 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
129aef0550f1c3924e9af4eb2b58c12c corporate/4.0/x86_64/lib64kdegraphics0-ksvg-3.5.4-0.12.20060mlcs4.x86_64.rpm
583ed26ed824d01f8f54e282800a541c corporate/4.0/x86_64/lib64kdegraphics0-ksvg-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
76bc8af5082d9ccda27f57ab8cb18f26 corporate/4.0/x86_64/lib64kdegraphics0-kview-3.5.4-0.12.20060mlcs4.x86_64.rpm
075d3c547fa866b7787a099b14e49345 corporate/4.0/x86_64/lib64kdegraphics0-kview-devel-3.5.4-0.12.20060mlcs4.x86_64.rpm
c9c2263610c4e435444af0d1106c6cf1 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.12.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFM3R/tmqjQ0CJFipgRAvmvAJ4qEtOg9t5Gr5oVuPHDfFHY43dswwCcDMNz
dIOiMxVEGn+tcTMbXbfM1do=
=mjef
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close