blob: b1ae8dc71cc517da4ecc448770be9d5aa77b9c8d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-13">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
pdftohtml includes vulnerable Xpdf code to handle PDF files, making it
vulnerable to execution of arbitrary code upon converting a malicious PDF
<product type="ebuild">pdftohtml</product>
<announced>January 10, 2005</announced>
<revised>January 10, 2005: 01</revised>
<package name="app-text/pdftohtml" auto="yes" arch="*">
<unaffected range="ge">0.36-r2</unaffected>
<vulnerable range="lt">0.36-r2</vulnerable>
pdftohtml is a utility to convert PDF files to HTML or XML
formats. It makes use of Xpdf code to decode PDF files.
Xpdf is vulnerable to integer overflows, as described in GLSA
<impact type="normal">
An attacker could entice a user to convert a specially-crafted PDF
file, potentially resulting in the execution of arbitrary code with the
rights of the user running pdftohtml.
There is no known workaround at this time.
All pdftohtml users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r2&quot;</code>
<uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200412-24</uri>
<uri link="">CAN-2004-1125</uri>
<metadata tag="submitter" timestamp="Sun, 9 Jan 2005 18:15:51 +0000">
<metadata tag="bugReady" timestamp="Sun, 9 Jan 2005 18:17:10 +0000">