Okular: Arbitrary code execution — GLSA 201311-20

A heap-based buffer overflow in Okular might allow a remote attacker to execute arbitrary code or cause a Denial of Service condition.

Affected packages

kde-base/okular on all architectures
Affected versions < 4.4.5-r2
Unaffected versions >= 4.4.5-r2

Background

Okular is a universal document viewer based on KPDF for KDE 4.

Description

Okular contains a heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp.

Impact

A remote attacker could entice a user to open a specially crafted PBD file using Okular, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Okular users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/okular-4.4.5-r2"
 

References

Release date
November 28, 2013

Latest revision
November 28, 2013: 1

Severity
normal

Exploitable
remote

Bugzilla entries