Your message dated Mon, 24 Jan 2005 15:20:39 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#291994: "Decrypt::makeFileKey2()" Buffer Overflow
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Jan 2005 13:47:56 +0000
>From [EMAIL PROTECTED] Mon Jan 24 05:47:56 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.arcert.gov.ar [200.47.53.18] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1Ct4ZP-00055e-00; Mon, 24 Jan 2005 05:47:55 -0800
Received: (qmail 6975 invoked from network); 24 Jan 2005 13:47:49 -0000
X-Scanned-By: ArCERT.
Received: from unknown (HELO clementina.arcert.gov.ar) (arcert)
  by mail.arcert.gov.ar with SMTP; 24 Jan 2005 13:47:48 -0000
Subject: "Decrypt::makeFileKey2()" Buffer Overflow
From: Luciano Bello <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Mon, 24 Jan 2005 10:46:01 -0300
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.3 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.5 required=4.0 tests=BAYES_30,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kpdf
Version: 3.x
Severity: grave
Tags: security sarge sid patch

The version in woody is not affected by this problem.

TITLE:
KDE kpdf "Decrypt::makeFileKey2()" Buffer Overflow

SECUNIA ADVISORY ID:
SA13916

VERIFY ADVISORY:
http://secunia.com/advisories/13916/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
KDE 3.x
http://secunia.com/product/219/

DESCRIPTION:
The vendor has acknowledged a vulnerability in kpdf, which can be
exploited by malicious people to compromise a user's system.

For more information:
SA13903

SOLUTION:
Apply patches.

KDE 3.2.3:
ftp://ftp.kde.org/pub/kde/security_patches/post-3.2.3-kdegraphics-3.diff

KDE 3.3.2:
ftp://ftp.kde.org/pub/kde/security_patches/post-3.3.2-kdegraphics-3.diff

ORIGINAL ADVISORY:
http://www.kde.org/info/security/advisory-20050119-1.txt

OTHER REFERENCES:
SA13903:
http://secunia.com/advisories/13903/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/



---------------------------------------
Received: (at 291994-done) by bugs.debian.org; 24 Jan 2005 14:20:42 +0000
>From [EMAIL PROTECTED] Mon Jan 24 06:20:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 84-120-64-130.onocable.ono.com (chistera.yi.org) [84.120.64.130] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Ct558-0006Wv-00; Mon, 24 Jan 2005 06:20:42 -0800
Received: from userid 1000 by chistera.yi.org with local (Exim 4.43) 
          id 1Ct555-0007um-N9; Mon, 24 Jan 2005 15:20:39 +0100
Date: Mon, 24 Jan 2005 15:20:39 +0100
From: Adeodato =?iso-8859-1?Q?Sim=F3?= <[EMAIL PROTECTED]>
To: Luciano Bello <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Bug#291994: "Decrypt::makeFileKey2()" Buffer Overflow
Message-ID: <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED],
        Adeodato =?iso-8859-1?Q?Sim=F3?= <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <[EMAIL PROTECTED]>
X-No-CC: Please respect my Mail-Followup-To header
User-Agent: Mutt/1.5.6+20050115i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.8 required=4.0 tests=BAYES_01,FROM_ENDS_IN_NUMS,
        HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

* Luciano Bello [Mon, 24 Jan 2005 10:46:01 -0300]:
> Package: kpdf
> Version: 3.x
> Severity: grave
> Tags: security sarge sid patch

> The version in woody is not affected by this problem.

  The version in sid either, see #291251. Will enter sarge 'soon'.

-- 
Adeodato Simó
    EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
 
Don't be irreplaceable, if you can't be replaced, you can't be promoted.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to