Bug 1043821 (CVE-2012-6535)

Summary: CVE-2012-6535 djvulibre: DoS or arbitrary code execution via specially crafted DjVu file
Product: [Other] Security Response Reporter: Ratul Gupta <ratulg>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-orphan, fdc, mkasik
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: djvulibre 3.5.25.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:31:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1043823    
Bug Blocks:    

Description Ratul Gupta 2013-12-17 09:53:02 UTC
DjVuLibre was found to have a vulnerability, where it incorrectly handled certain memory operations, which could be exploited by an attacker via a specially crafted DjVu (.djv) file, which when executed by the user or an automated system, could lead to crashing of the application (DoS) or possibly execute arbitrary code.

The issue is said to be fixed in DjVuLibre 3.5.25.3.

References:
http://www.ubuntu.com/usn/usn-2056-1/

Comment 1 Ratul Gupta 2013-12-17 09:54:00 UTC
Created djvulibre tracking bugs for this issue:

Affects: epel-6 [bug 1043823]

Comment 2 Fedora Update System 2014-01-01 23:09:42 UTC
djvulibre-3.5.25.3-11.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.