安全研究

安全漏洞
Xpdf嵌入字体处理代码执行漏洞

发布日期:2008-04-17
更新日期:2008-04-21

受影响系统:
Xpdf Xpdf 3.x
描述:
BUGTRAQ  ID: 28830
CVE(CAN) ID: CVE-2008-1693

Xpdf是便携文档格式(PDF)文件的开放源码查看器。

Xpdf显示PDF文件中所嵌入的畸形字体的方式存在漏洞,攻击者可以创建恶意的PDF文件,如果打开了该文件就会导致Xpdf崩溃或执行任意指令。

<*来源:Kees Cook (kees@ubuntu.com
  
  链接:http://secunia.com/advisories/29816/
        https://rhn.redhat.com/errata/RHSA-2008-0238.html
        https://www.redhat.com/support/errata/RHSA-2008-0240.html
        https://www.redhat.com/support/errata/RHSA-2008-0239.html
        http://www.debian.org/security/2008/dsa-1548
        http://www.debian.org/security/2008/dsa-1606
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1606-1)以及相应补丁:
DSA-1606-1:poppler packages fix execution of arbitrary code
链接:http://www.debian.org/security/2008/dsa-1606

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch3.dsc
Size/MD5 checksum:      757 1560882fd2916cf690dfab5b36caf393
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch3.diff.gz
Size/MD5 checksum:   484328 8f9c696fb31d332b65515d263b9b29da
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5.orig.tar.gz
Size/MD5 checksum:   783752 2bb1c75aa3f9c42f0ba48b5492e6d32c

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:    30352 3a20e8e3a5f60e0c8a676a290e858a61
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:    43058 9bb013f968577d9320de44b82e7fd1f1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:   772710 d2b3b2490771162ac139f5246e85b231
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:    86580 c396dba838001d108bf56d477f08cd4b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:    34056 5f12b52c57a11f9881e433bb9710acaa
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:    55052 fd976b4ba5a06387095fd5ab0eb1ddd3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_alpha.deb
Size/MD5 checksum:   504476 19e19093f81f966f0e8e2da723f8e07b

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:   613694 30e519a2a6a52073527556f7be56e368
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:    30656 879a9f7b40b84395dec8667fbaed7a30
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:    46070 3fca3fa3a27cd8591e3b654e0063d818
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:    41768 0e876f9dde8c94548fb5a5f973d4d1fb
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:   456526 1aa5b6834c6605b9c0c89d76c527b085
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:    29706 252693ce004ebe4da029cb8cac60c8ad
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_amd64.deb
Size/MD5 checksum:    83614 4f3e6d766e655a6a6e48ce379853e720

arm architecture (ARM)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:    40176 c220cbc637a1898a24f3d6facf2334b5
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:    81782 513ca3c03a1d48caa5ab2ddd4ada7aed
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:   438142 f4b166156f43a8715d2cc8b27c621e53
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:    44736 ae0bddb8502ebb76a4f9624dcac81604
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:    29436 d43e6939e318a65c9c8e0c16cb02bd38
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:    30426 0967f5e7fa741c8cf026ffb763ff014e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_arm.deb
Size/MD5 checksum:   594928 dac70571d0ad3f9a909198b26a28faa4

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:   540242 df8ce9c4c3a169f9be4e3926d994eee6
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:    45668 74f74bfe2617742ead80785c9e11cbad
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:    87808 41b1e8124adc89510682a7583c76923c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:    50304 a811b4590c717572d0e531b1c818f5a4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:    31084 357259aca7b21fa7971c9f884fb43726
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:   713728 a90e1e548048facb915ce56eccada131
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_hppa.deb
Size/MD5 checksum:    31838 38bdf2ce3f6f7f5131d15d4b8a609630

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:    41398 6e9efb137e66dfd94845df3317e21fd1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:   577624 0fdd4127669e2a47670cb4047f9cd21d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:    30342 681d77159be64f8285d2292fa718ccc2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:    29758 790a89e5646fcaf5ffa5209fa17540d2
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:    44856 09726e0b4b94ac65ad12d70ea485469f
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:    80810 8b155f09a771e3ed179a973a7a7d06e4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_i386.deb
Size/MD5 checksum:   443684 817175329a0cfead2f00c128ad8f55f8

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:   613198 31d755b29e5623ee0ece5795bee720cc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:    32206 aa89439c77d7ef337971944ee621b064
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:    54842 36132f7b438eac1b793cc7ba7c1a740a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:    33788 0603447588cfbffd6969596a06f7ad57
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:   105274 679fe2ab7f9cc54b7e86b7b02c1f6eb7
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:   808860 774cbfee74f2b356689996d27c79bcb3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_ia64.deb
Size/MD5 checksum:    47804 a1e68d3e0dc53644c5441fb7c1b03a64

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:    50294 8598301860f891c34b5028950926e23c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:   457928 b27722d07d500b168c8ac57e84c24d7c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:    41816 dd3ce7ee3f109ea7b391bebe67631708
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:   674736 3d4f077c3a79d1b1adb6ad5a2c79c8fc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:    31980 f170e8066e739f995a6bc7af43f22fde
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:    86668 d8d6c0f593dbcf10984a171a77f36c77
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_mips.deb
Size/MD5 checksum:    29582 97643d32f0109d0a692b13942f48e413

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:    89292 cd9cf091a64c2e3f98b07fcb82d8f850
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:   472336 2b6b5805523bda347c3a01473b068327
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:    48130 eacfcf656af6fbc9c16cff979b37e75e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:    31438 b132335b02f73e42de78e173cbcbbfb6
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:    31406 a091098584a0686afc4b28ae1fbf83c5
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:   651942 78df9e2410257f45d1eeb22da2ae805c
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_powerpc.deb
Size/MD5 checksum:    43162 4455826b656b6e8d5f966c470ca6ca03

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:   453844 9018dafb416a5fbb7cf6e67a98b7ca16
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:    29504 e6d1179ace04c734f919a53c4ed20c85
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:    46820 1e299394d64f0bf5a17dd340a41e55a0
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:    80750 a61100d27837dc60ef1857b8d786fada
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:    30596 8153c10261795e578b27c2ede5cc5528
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:    41692 26f0d2342e4386061533faa2a55f5de3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_s390.deb
Size/MD5 checksum:   621930 27d8f7cc1cd2c307285eafddc3efb70b

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:   583994 e2d0fbcc107d82d95a774ad7b24dbd43
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:    78276 e75355488b436d46872686c50397ef04
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:    40438 d7b939665ce01d3773e76456a310d3bc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:    30616 96c7b850564ce3c51e75e0e0241ac6a1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:    29272 aed8c46365fd59e786288d4e55298792
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:   444346 2e2b0a2a3bd75ed2d534f48ef4a1b275
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch3_sparc.deb
Size/MD5 checksum:    44546 7dcf884f27b08f31306b332e817f4571

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2008:0239-01)以及相应补丁:
RHSA-2008:0239-01:Important: poppler security update
链接:https://www.redhat.com/support/errata/RHSA-2008-0239.html

浏览次数:2994
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障