Xpdf Gfx::getPos()函数未初始化指针引用漏洞

受影响系统:

Xpdf Xpdf 3.x
Xpdf Xpdf 2.x

描述:

Xpdf是便携文档格式(PDF)文件的开放源码查看器。

在某些情况下Xpdf的Gfx::getPos()函数中可能会试图引用未经初始化的Gfx::parser指针,诱骗受骗打开了恶意的PDF文档就会导致拒绝服务或执行任意代码。

<*来源:Joel Voss
  
  链接:
http://secunia.com/advisories/41596/
        https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=595245
        https://www.redhat.com/support/errata/RHSA-2010-0754.html
        https://www.redhat.com/support/errata/RHSA-2010-0755.html
        https://www.redhat.com/support/errata/RHSA-2010-0753.html
        https://www.redhat.com/support/errata/RHSA-2010-0752.html
        https://www.redhat.com/support/errata/RHSA-2010-0750.html
        https://www.redhat.com/support/errata/RHSA-2010-0751.html
        https://www.redhat.com/support/errata/RHSA-2010-0749.html
*>

建议:

厂商补丁:

RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2010:0749-01)以及相应补丁:
RHSA-2010:0749-01:Important: poppler security update
链接:
https://www.redhat.com/support/errata/RHSA-2010-0749.html

Xpdf
—-
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf

发表评论?

0 条评论。

发表评论