Bug 428126 (CVE-2007-0104)

Summary: CVE-2007-0104 xpdf infinite loop DoS
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: tcallawa, than
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0104
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-09 12:45:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2008-01-09 12:40:19 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-0104 to the following vulnerability:

The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.

References:

http://www.securityfocus.com/archive/1/archive/1/457055/100/0/threaded
http://www.kde.org/info/security/advisory-20070115-1.txt
https://issues.rpath.com/browse/RPL-964
http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
http://docs.info.apple.com/article.html?artnum=305214
http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
http://www.novell.com/linux/security/advisories/2007_3_sr.html
http://www.ubuntu.com/usn/usn-410-1
http://www.ubuntu.com/usn/usn-410-2
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://www.securityfocus.com/bid/21910
http://projects.info-pull.com/moab/MOAB-06-01-2007.html
http://www.frsirt.com/english/advisories/2007/0203
http://www.frsirt.com/english/advisories/2007/0212
http://www.frsirt.com/english/advisories/2007/0244
http://www.frsirt.com/english/advisories/2007/0930
http://securitytracker.com/id?1017514
http://www.securitytracker.com/id?1017749
http://secunia.com/advisories/23799
http://secunia.com/advisories/23791
http://secunia.com/advisories/23808
http://secunia.com/advisories/23813
http://secunia.com/advisories/23815
http://secunia.com/advisories/23844
http://secunia.com/advisories/23839
http://secunia.com/advisories/23876
http://secunia.com/advisories/24204
http://secunia.com/advisories/24479
http://xforce.iss.net/xforce/xfdb/31364

Comment 1 Mark J. Cox 2008-01-09 12:45:02 UTC
Based on our own research and information from Adobe we believe the description
of this issue isn't totally accurate (this isn't a problem with the
specification, but with specific implementations of the specification).

Basically, some implementations of the PDF spec, including acrobat reader 7.0.8,
erroneously allow page tree objects that refer back to themselves. As a result,
an infinite loop could be created. As far as we could tell, the worst a
malformed file could do is DOS the application.

We do not consider a user-assisted DoS of a client application such as xpdf be a
security issue.