poplix has discovered a vulnerability in PDFlib, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
The vulnerability is caused due to a boundary error within the "pdc_fsearch_fopen()" function. This can be exploited to cause a stack-based buffer overflow via e.g. a call to "PDF_load_image()" with an overly long filename parameter.
NOTE: Other functions are also reportedly affected by similar boundary errors.
The vulnerability is confirmed in version 7.0.2 for Linux on IA-32. Other versions may also be affected.
Solution: Do not allow untrusted users to manipulate the parameters passed to PDFlib functions.
Provided and/or discovered by: poplix
Original Advisory: http://seclists.org/bugtraq/2007/Dec/0281.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org