+++ This bug was initially created as a clone of Bug #173888 +++ Derek Noonburg sent us a patch for xpdf to correct a number of security issues. This is due to be public 20051201. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue affects RHEL3, RHEL3, RHEL2.1 -- Additional comment from mjc on 2005-11-22 03:42 EST -- Created an attachment (id=121332) Proposed patch from Derek
These issues have been fixed in FEDORA-2005-1121 and FEDORA-2005-1122.
The original fix for this issue was incomplete.
The patches for these issues are in attachment 122226 [details] and attachment 122227 [details]. The sooner we can have new packages rolled the better as the Christmas holiday is quickly approaching.
There aren't currently any reproducers for these issues. Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and poppler. Some cooperation will probably make things easier.
it's now fixed in xpdf-3.01-0.FC3.4 and xpdf-3.01-0.FC4.5
From User-Agent: XML-RPC xpdf-3.01-0.FC4.5 has been pushed for FC4, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.
From User-Agent: XML-RPC xpdf-3.01-0.FC3.4 has been pushed for FC3, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.