Bug 1027548 (CVE-2013-6474)

Summary: CVE-2013-6474 cups-filters: heap-based buffer overflow flaw in pdftoopvp
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fweimer, security-response-team, twaugh, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-03-11 05:32:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1074840    
Bug Blocks: 1002935, 1010117    

Description Murray McAllister 2013-11-07 04:16:52 UTC
A heap-based buffer overflow flaw was found in the pdftoopvp filter. If a malicious PDF file were processed, it could lead to arbitrary code execution with the privileges of the "lp" user. This issue was due to the following fix not being present in pdftoopvp:



This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

Comment 2 Huzaifa S. Sidhpurwala 2014-03-11 05:14:49 UTC
Public via:


This issue has been resolved in upstream cups-filters-1.0.47

Comment 3 Huzaifa S. Sidhpurwala 2014-03-11 05:18:19 UTC
Created cups-filters tracking bugs for this issue:

Affects: fedora-all [bug 1074840]