blob: a91da56579599e69dffe21db8b0b0a69805da2b3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200502-10">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
pdftohtml includes vulnerable Xpdf code to handle PDF files, making it
vulnerable to execution of arbitrary code upon converting a malicious PDF
<product type="ebuild">pdftohtml</product>
<announced>February 09, 2005</announced>
<revised>February 09, 2005: 01</revised>
<package name="app-text/pdftohtml" auto="yes" arch="*">
<unaffected range="ge">0.36-r3</unaffected>
<vulnerable range="lt">0.36-r3</vulnerable>
pdftohtml is a utility to convert PDF files to HTML or XML
formats. It makes use of Xpdf code to decode PDF files.
Xpdf is vulnerable to a buffer overflow, as described in GLSA
<impact type="normal">
An attacker could entice a user to convert a specially-crafted PDF
file, potentially resulting in the execution of arbitrary code with the
rights of the user running pdftohtml.
There is no known workaround at this time.
All pdftohtml users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r3&quot;</code>
<uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
<uri link="">CAN-2005-0064</uri>
<metadata tag="submitter" timestamp="Sat, 5 Feb 2005 20:35:14 +0000">
<metadata tag="bugReady" timestamp="Wed, 9 Feb 2005 15:54:21 +0000">