int(1798)

Vulnerability Bulletins


Ejecución arbitraria de código en pstotext

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software pstotext

Description

Se ha descubierto una vulnerabilidad en la aplicación para convertir ficheros PostScript y PDF "pstotext". La vulnerabilidad reside en que la opción "-dSAFER" no es llamada desde el programa al hacer las conversiones.

La explotación de esta vulnerabilidad podría permitir a un fichero PostScript o PDF especialmente diseñado ejecutar código arbitrario.

Solution



Actualización de software

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.dsc
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1.diff.gz
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_alpha.deb
ARM
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.8g-5woody1_sparc.deb
Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.dsc
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_amd64.deb
ARM
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/p/pstotext/pstotext_1.9-1sarge1_sparc.deb

Standar resources

Property Value
CVE CAN-2005-2536
BID

Other resources

Debian Security Advisory DSA 792-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00180.html

Version history

Version Comments Date
1.0 Aviso emitido 2005-09-02
Ministerio de Defensa
CNI
CCN
CCN-CERT