[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SEGURANÇA][DSA-931-1] xpdf -- estouro de pilha



--------------------------------------------------------------------------
Alerta de Segurança Debian DSA 929-1                  security@debian.org
http://www.debian.org/security/                            Martin Schulze
9 de Janeiro de 2006                   http://www.debian.org/security/faq
--------------------------------------------------------------------------
Essa é uma tradução do DSA (Debian Security Advisory - Alerta de Segurança
Debian) que é enviado para a lista [1]debian-security-announce e, por esse
motivo, há um atraso entre o anúncio original em inglês e esta tradução.
Caso queira receber os alertas em inglês, [2]inscreva-se na lista.

1.http://lists.debian.org/debian-security-announce
2.http://www.debian.org/MaillingLists/subscribe@debian-security-announce
--------------------------------------------------------------------------
Vulnerabilidade  : estouro de pilha 
Tipo de Problema : remota
Específico Debian: não
CVE ID           : [3]CAN-2005-3191 [4]CAN-2005-3192 [5]CAN-2005-3193
                   [6]CVE-2005-3624 [7]CVE-2005-3625 [8]CVE-2005-3626 
                   [9]CVE-2005-3627 [10]CVE-2005-3628

    "infamous41md" e Chris Evans descobriram vários estouros de pilha
baseados em "heap" no xpdf, a suíte para Formato de Documentos Portáveis
("PDF"), que podem levar à negação de serviço pela quebra da aplicação
ou, possivelmente, a uma execução de código arbitrário.

    Para a antiga distribuição estável ("woody") estes problemas foram
corrigidos na versão 1.00-3.8.

    Para a distribuição estável ("sarge") estes problemas foram
corrigidos na versão 3.00-13.4.

    Para a distribuição instável ("sid") estes problemas foram
corrigidos na versão 3.01-4.

    Recomendamos que você atualize seu pacote xpdf.

Corrigido em:

Debian GNU/Linux 3.0 (woody)

Fonte:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.8.dsc
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.8.diff.gz
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00.orig.tar.gz
Componente independente de arquitetura:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_1.00-3.8_all.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_1.00-3.8_all.deb
Alpha:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_alpha.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_alpha.deb
ARM:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_arm.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_arm.deb
Intel IA-32:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_i386.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_i386.deb
Intel IA-64:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_ia64.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_ia64.deb
HPPA:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_hppa.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_hppa.deb
Motorola 680x0:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_m68k.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_m68k.deb
Big endian MIPS:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_mips.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_mips.deb
Little endian MIPS:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_mipsel.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_mipsel.deb
PowerPC:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_powerpc.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_powerpc.deb
IBM S/390:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_s390.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_s390.deb
Sun Sparc:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_1.00-3.8_sparc.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_1.00-3.8_sparc.deb

Debian GNU/Linux 3.1 (sarge)

Fonte:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.4.dsc
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.4.diff.gz
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00.orig.tar.gz
Componente independente de arquitetura:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.00-13.4_all.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.00-13.4_all.deb
Alpha:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_alpha.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_alpha.deb
AMD64:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_amd64.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_amd64.deb
ARM:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_arm.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_arm.deb
Intel IA-32:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_i386.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_i386.deb
Intel IA-64:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_ia64.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_ia64.deb
HPPA:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_hppa.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_hppa.deb
Motorola 680x0:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_m68k.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_m68k.deb
Big endian MIPS:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_mips.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_mips.deb
Little endian MIPS:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_mipsel.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_mipsel.deb
PowerPC:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_powerpc.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_powerpc.deb
IBM S/390:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_s390.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_s390.deb
Sun Sparc:
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.00-13.4_sparc.deb
    http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.00-13.4_sparc.deb

    Checksums MD5 dos arquivos listados estão disponíveis no alerta [11]original.


3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191
4.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192
5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193
6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
7.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
8.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
9.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
10.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
11.http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00002.html

-- 
     
        Marco Carvalho (macs) <marcocarvalho89@yahoo.com.br>
 *******************************************************************
   .''`.   Debian Weekly News: <http://www.debian.org/News/weekly>
  : :'  :  Debian BR.........: <http://debian-br.cipsga.org.br>   
  `. `'`        Equipe de Imprensa e Traduções do Debian-BR
    `-                 O que você quer saber hoje?

Attachment: signature.asc
Description: Digital signature


Reply to: