blob: 4f0d565e466086c8ccf8fb71cf7f4ff836940137 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200710-20">
<title>PDFKit, ImageKits: Buffer overflow</title>
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
overflow allowing for the user-assisted execution of arbitrary code.
<product type="ebuild">pdfkit imagekits</product>
<announced>October 18, 2007</announced>
<revised>October 18, 2007: 01</revised>
<package name="gnustep-libs/pdfkit" auto="yes" arch="*">
<vulnerable range="le">0.9_pre062906</vulnerable>
<package name="gnustep-libs/imagekits" auto="yes" arch="*">
<vulnerable range="le">0.6</vulnerable>
PDFKit is a framework for rendering of PDF content in GNUstep
applications. ImageKits is a collection of frameworks to support
imaging in GNUstep applications.
Maurycy Prodeus discovered an integer overflow vulnerability possibly
leading to a stack-based buffer overflow in the XPDF code which PDFKit
is based on. ImageKits also contains a copy of PDFKit.
<impact type="normal">
By enticing a user to view a specially crafted PDF file with a viewer
based on ImageKits or PDFKit such as Gentoo's ViewPDF, a remote
attacker could cause an overflow, potentially resulting in the
execution of arbitrary code with the privileges of the user running the
There is no known workaround at this time.
PDFKit and ImageKits are not maintained upstream, so the packages were
masked in Portage. We recommend that users unmerge PDFKit and
# emerge --unmerge gnustep-libs/pdfkit
# emerge --unmerge gnustep-libs/imagekits</code>
As an alternative, users should upgrade their systems to use PopplerKit
instead of PDFKit and Vindaloo instead of ViewPDF.
<uri link="">CVE-2007-3387</uri>
<uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
<metadata tag="requester" timestamp="Tue, 02 Oct 2007 21:24:54 +0000">
<metadata tag="submitter" timestamp="Sun, 07 Oct 2007 23:31:24 +0000">
<metadata tag="bugReady" timestamp="Tue, 09 Oct 2007 18:28:10 +0000">