__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN kdegraphics Security Update [Red Hat RHSA-2008:0238-3] April 25, 2008 11:00 GMT Number S-269 [REVISED 8 May 2008] ______________________________________________________________________________ PROBLEM: There is a flaw in the way kpdf displayed malformed fonts embedded in PDF files which could potentially execute arbitrary code. PLATFORM: Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS, ES, WS (v. 4, v. 5 server) RHEL Desktop Workstation (v. 5 client) Red Hat Enterprise Linux Desktop (v. 5 client) DAMAGE: DoS or potentially, execute arbitrary code. SOLUTION: Upgrade to the appropriate verison. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. An attacker could create a malicious PDF ASSESSMENT: file that would cause kpdf to crash, or potentially, execute arbitrary code when opened. ______________________________________________________________________________ CVSS 2 BASE SCORE: 7.5 TEMPORAL SCORE: 6.2 VECTOR: (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C) ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/s-269.shtml ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2008-0238.html ADDITIONAL LINKS: https://rhn.redhat.com/errata/RHSA-2008-0240.html https://rhn.redhat.com/errata/RHSA-2008-0239.html https://rhn.redhat.com/errata/RHSA-2008-0262.html CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2008-1693 ______________________________________________________________________________ REVISION HISTORY: 05/08/2008 - revised S-269 to add a link to Red Hat RHSA-2008:0262-2 for Red Hat Destkop (v. 4) and Red Hat Enterprise Linux AS, ES, WS (v. 4). [***** Start Red Hat RHSA-2008:0238-3 *****] Important: kdegraphics security update Advisory: RHSA-2008:0238-3 Type: Security Advisory Severity: Important Issued on: 2008-04-17 Last updated on: 2008-04-17 Affected Products: Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) OVAL: com.redhat.rhsa-20080238.xml CVEs (cve.mitre.org): CVE-2008-1693 Details Updated kdegraphics packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment, including kpdf, a PDF file viewer. Kees Cook discovered a flaw in the way kpdf displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash, or, potentially, execute arbitrary code when opened. (CVE-2008-1693) All kdegraphics users are advised to upgrade to these updated packages, which contain backported patches to resolve this issue. Solution Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 Updated packages Red Hat Desktop (v. 4) -------------------------------------------------------------------------------- SRPMS: kdegraphics-3.3.1-9.el4_6.src.rpm 1f01331787841abea11c3d3c28a03802 IA-32: kdegraphics-3.3.1-9.el4_6.i386.rpm 429a3aac19f9544c741406384cebb09d kdegraphics-devel-3.3.1-9.el4_6.i386.rpm f52e57ed95e5a2c966800c7692bcde46 x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm e298b93704a2ed860635e7d19adfd138 kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm 9a09d998d25c41aba76db973fe84a405 Red Hat Enterprise Linux AS (v. 4) -------------------------------------------------------------------------------- SRPMS: kdegraphics-3.3.1-9.el4_6.src.rpm 1f01331787841abea11c3d3c28a03802 IA-32: kdegraphics-3.3.1-9.el4_6.i386.rpm 429a3aac19f9544c741406384cebb09d kdegraphics-devel-3.3.1-9.el4_6.i386.rpm f52e57ed95e5a2c966800c7692bcde46 IA-64: kdegraphics-3.3.1-9.el4_6.ia64.rpm 33dcb723b2ad7c8abec2bd2dcd6fa627 kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm a887ac19a40b0a6b7690ce34c66d307e PPC: kdegraphics-3.3.1-9.el4_6.ppc.rpm e731c8319e23a3cf45e05b4aa9461de7 kdegraphics-devel-3.3.1-9.el4_6.ppc.rpm d5e7e492769fb99f9f656fc44b3ff28d s390: kdegraphics-3.3.1-9.el4_6.s390.rpm a735a41d8624f967b38d69057f849eb5 kdegraphics-devel-3.3.1-9.el4_6.s390.rpm c3f7a2964e4602d437fbfaea6702d6c6 s390x: kdegraphics-3.3.1-9.el4_6.s390x.rpm be4104052248a69b49d5a72b55096fd3 kdegraphics-devel-3.3.1-9.el4_6.s390x.rpm f42b2d978432f7a50d3b49815df8d2ae x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm e298b93704a2ed860635e7d19adfd138 kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm 9a09d998d25c41aba76db973fe84a405 Red Hat Enterprise Linux ES (v. 4) -------------------------------------------------------------------------------- SRPMS: kdegraphics-3.3.1-9.el4_6.src.rpm 1f01331787841abea11c3d3c28a03802 IA-32: kdegraphics-3.3.1-9.el4_6.i386.rpm 429a3aac19f9544c741406384cebb09d kdegraphics-devel-3.3.1-9.el4_6.i386.rpm f52e57ed95e5a2c966800c7692bcde46 IA-64: kdegraphics-3.3.1-9.el4_6.ia64.rpm 33dcb723b2ad7c8abec2bd2dcd6fa627 kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm a887ac19a40b0a6b7690ce34c66d307e x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm e298b93704a2ed860635e7d19adfd138 kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm 9a09d998d25c41aba76db973fe84a405 Red Hat Enterprise Linux WS (v. 4) -------------------------------------------------------------------------------- SRPMS: kdegraphics-3.3.1-9.el4_6.src.rpm 1f01331787841abea11c3d3c28a03802 IA-32: kdegraphics-3.3.1-9.el4_6.i386.rpm 429a3aac19f9544c741406384cebb09d kdegraphics-devel-3.3.1-9.el4_6.i386.rpm f52e57ed95e5a2c966800c7692bcde46 IA-64: kdegraphics-3.3.1-9.el4_6.ia64.rpm 33dcb723b2ad7c8abec2bd2dcd6fa627 kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm a887ac19a40b0a6b7690ce34c66d307e x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm e298b93704a2ed860635e7d19adfd138 kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm 9a09d998d25c41aba76db973fe84a405 (The unlinked packages above are only available from the Red Hat Network) References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 http://www.redhat.com/security/updates/classification/#important -------------------------------------------------------------------------------- These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/ [***** End Red Hat RHSA-2008:0238-3 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) S-213: Nukedit 'email' Parameter Vulnerability S-214: SurgeMail and WebMail 'Page' Command Vulnerability S-215: Symantec Backup Exec Scheduler ActiveX Control Multiple Vulnerabilities S-216: Juniper Networks Secure Access 2000 'rdremediate.cgi' Vulnerability S-217: Drupal Multiple HTML Vulnerabilities S-218: gd Security Update S-219: Juniper Networks Secure Access 2000 Web Root Path Vulnerability S-220: PHP-Nuke My_eGallery Module 'gid' Parameter Vulnerability S-221: Learn2 STRunner ActiveX Control Vulnerabilities S-222: Evolution Security Update