-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
--------------------------------------------------------------------------
Turbolinux Security Advisory TLSA-2005-3
http://www.turbolinux.co.jp/security/
security-team@turbolinux.co.jp
--------------------------------------------------------------------------
Original released date: 20 Jan 2005
Last revised: 20 Jan 2005
Package: xpdf
Summary: Buffer overflow
More information:
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files. The buffer overflow was found in the Gfx::doImage function
in Gfx.cc in xpdf version 3.00.
Impact:
These vulnerabilities may allow remote attackers to execute arbitrary
code via malformed PDF files.
Affected Products:
- Turbolinux 10 Server
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
# turbopkg
or
# zabom -u xpdf
---------------------------------------------
<Turbolinux 10 Server>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/xpdf-3.00-5.src.rpm
4604490 d33abd903ee32d277260d1c230dcfe70
References:
CVE
[
CAN-2004-1125]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=
CAN-2004-1125
--------------------------------------------------------------------------
Revision History
20 Jan 2005 Initial release
--------------------------------------------------------------------------
Copyright(C) 2005 Turbolinux, Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFB70IEK0LzjOqIJMwRAkh7AKCptRtr1qwt3z7FUnWF3F/O3lI2TwCfQXD+
c+AkR3GPUppc/uqFL2dAGNc=
=OgbY
-----END PGP SIGNATURE-----