*** This bug has been split off bug 135393 *** ------- Original comment by Mark J. Cox (Security Response Team) on 2004.10.12 10:20 ------- During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of xpdf. An attacker could construct a carefully crafted PDF file that could cause xpdf to crash or possibly execute arbitrary code when opened. CAN-2004-0888 Affects: 2.1AS 2.1AW 2.1ES 2.1WS CAN-2004-0888 Affects: 3AS 3ES 3WS 3Desktop This issue is embargoed until Oct20 1400UTC
it's now fixed in xpdf-3.00-11.5 (RHEL4), xpdf-2.02-9.6 (RHEL-3) and xpdf-0.92-14 (RHEL-2)
Our original patch for this issue was incomplete. Please see bug 135393 for the correct fix.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-034.html