Bug 75922

Summary: KGhostview Arbitary Code Execution
Product: [Retired] Red Hat Linux Reporter: James Brost <kb2wdi>
Component: kdegraphicsAssignee: Than Ngo <than>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 7.3Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://www.kde.org/info/security/advisory-20021008-1.txt
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2002-10-15 00:50:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description James Brost 2002-10-15 00:50:17 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 Galeon/1.2.6 (X11; Linux i686; U;) Gecko/20020916

Description of problem:
KGhostview includes a DSC 3.0 parser from GSview, which is vulnerable to a
buffer overflow while parsing a specially crafted .ps input file. It also
contains code from gv 3.5.x which is vulnerable to another buffer overflow
triggered by malformed postscript or Adobe pdf files.

Version-Release number of selected component (if applicable):


How reproducible:
Didn't try

Steps to Reproduce:
Viewing certain Postscript or PDF files can result in the execution of
arbitary code placed in the file and as a result opens possibilities for any
remote manipulation under the local user account.


Additional info:

KGhostView of any KDE release between KDE 1.1 and KDE 3.0.3a

Comment 1 Ngo Than 2002-10-21 21:24:06 UTC
It's fixed in 3.0.3-0.7.2. We will release it as errata soon