Debian DSA-1509-1 : koffice - multiple vulnerabilities

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote Debian host is missing a security-related update.

Description :

Several vulnerabilities have been discovered in xpdf code that is
embedded in koffice, an integrated office suite for KDE. These flaws
could allow an attacker to execute arbitrary code by inducing the user
to import a specially crafted PDF document. The Common Vulnerabilities
and Exposures project identifies the following problems :

- CVE-2007-4352
Array index error in the
DCTStream::readProgressiveDataUnit method in
xpdf/ in Xpdf 3.02pl1, as used in poppler,
teTeX, KDE, KOffice, CUPS, and other products, allows
remote attackers to trigger memory corruption and
execute arbitrary code via a crafted PDF file.

- CVE-2007-5392
Integer overflow in the DCTStream::reset method in
xpdf/ in Xpdf 3.02p11 allows remote attackers
to execute arbitrary code via a crafted PDF file,
resulting in a heap-based buffer overflow.

- CVE-2007-5393
Heap-based buffer overflow in the
CCITTFaxStream::lookChar method in xpdf/ in
Xpdf 3.02p11 allows remote attackers to execute
arbitrary code via a PDF file that contains a crafted
CCITTFaxDecode filter.

Updates for the old stable distribution (sarge) will be made available
as soon as possible.

See also :

Solution :

Upgrade the koffice package.

For the stable distribution (etch), these problems have been fixed in
version 1:1.6.1-2etch2.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Family: Debian Local Security Checks

Nessus Plugin ID: 31170 (debian_DSA-1509.nasl)

Bugtraq ID: 26367

CVE ID: CVE-2007-4352

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now