Your message dated Mon, 24 Jan 2005 11:48:08 -0300
with message-id <[EMAIL PROTECTED]>
and subject line 
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Jan 2005 14:16:50 +0000
>From [EMAIL PROTECTED] Mon Jan 24 06:16:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.arcert.gov.ar [200.47.53.18] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1Ct51N-0004zT-00; Mon, 24 Jan 2005 06:16:49 -0800
Received: (qmail 8446 invoked from network); 24 Jan 2005 14:16:44 -0000
X-Scanned-By: ArCERT.
Received: from unknown (HELO clementina.arcert.gov.ar) (arcert)
  by mail.arcert.gov.ar with SMTP; 24 Jan 2005 14:16:44 -0000
Subject: "Decrypt::makeFileKey2()" Buffer Overflow
From: Luciano Bello <[EMAIL PROTECTED]>
To: Submit BTS <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Mon, 24 Jan 2005 11:14:57 -0300
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.3 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_01,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kpdf
Version: 3.x
Severity: grave
Tags: security patch

TITLE:
KOffice "Decrypt::makeFileKey2()" Buffer Overflow

SECUNIA ADVISORY ID:
SA13934

VERIFY ADVISORY:
http://secunia.com/advisories/13934/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
KOffice 1.x
http://secunia.com/product/4155/

DESCRIPTION:
A vulnerability has been reported in KOffice, which can be exploited
by malicious people to compromise a user's system.

For more information:
SA13903

The vulnerability has been reported in versions 1.3 through 1.3.5.

SOLUTION:
Apply patch.

KOffice 1.3.5:
ftp://ftp.kde.org/pub/kde/security_patches/post-1.3.5-koffice.diff

ORIGINAL ADVISORY:
http://www.kde.org/info/security/advisory-20050120-1.txt

OTHER REFERENCES:
SA13903:
http://secunia.com/advisories/13903/


---------------------------------------
Received: (at 292002-done) by bugs.debian.org; 24 Jan 2005 14:50:03 +0000
>From [EMAIL PROTECTED] Mon Jan 24 06:50:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.arcert.gov.ar [200.47.53.18] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1Ct5XW-00038h-00; Mon, 24 Jan 2005 06:50:02 -0800
Received: (qmail 9615 invoked from network); 24 Jan 2005 14:49:54 -0000
X-Scanned-By: ArCERT.
Received: from unknown (HELO clementina.arcert.gov.ar) (arcert)
  by mail.arcert.gov.ar with SMTP; 24 Jan 2005 14:49:53 -0000
Subject: 
From: Luciano Bello <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Mon, 24 Jan 2005 11:48:08 -0300
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.3 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-1.5 required=4.0 tests=BAYES_00,NOSUBJECT 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

It's done acording to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=291245 

Sorry


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to