blob: 603e72d0565478af682e0a0e65ec328d57c57d9c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-30">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
pdftohtml includes vulnerable Xpdf code to handle PDF files, making it
vulnerable to execution of arbitrary code upon converting a malicious PDF
<product type="ebuild">pdftohtml</product>
<announced>November 23, 2004</announced>
<revised>November 23, 2004: 01</revised>
<package name="app-text/pdftohtml" auto="yes" arch="*">
<unaffected range="ge">0.36-r1</unaffected>
<vulnerable range="le">0.36</vulnerable>
pdftohtml is a utility to convert PDF files to HTML or XML
formats. It makes use of Xpdf code to decode PDF files.
Xpdf is vulnerable to multiple integer overflows, as described in
GLSA 200410-20.
<impact type="normal">
An attacker could entice a user to convert a specially-crafted PDF
file, potentially resulting in execution of arbitrary code with the
rights of the user running pdftohtml.
There is no known workaround at this time.
All pdftohtml users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r1&quot;</code>
<uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
<uri link="">CAN-2004-0888</uri>
<metadata tag="submitter" timestamp="Mon, 22 Nov 2004 17:05:12 +0000">
<metadata tag="bugReady" timestamp="Mon, 22 Nov 2004 17:05:20 +0000">