Bug 42666 (CVE-2003-0508) - VUL-0: CVE-2003-0508: buffer overflow in acroread
Summary: VUL-0: CVE-2003-0508: buffer overflow in acroread
Status: RESOLVED FIXED
Alias: CVE-2003-0508
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2003-0508: CVSS v2 Base Score: 7....
Keywords:
Depends on:
Blocks:
 
Reported: 2003-07-02 17:03 UTC by Johannes Meixner
Modified: 2021-09-27 10:17 UTC (History)
5 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
patchinfo (426 bytes, text/plain)
2003-07-07 19:10 UTC, Thomas Biege
Details
putonftp (254 bytes, text/plain)
2003-07-07 19:11 UTC, Thomas Biege
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2003-07-02 17:03:23 UTC
Hi, 
unfortunately another security problem was found in acrobat reader. 
http://www.securityfocus.com/archive/1/327335 
 
A buffer overflow can be exploited via malformed pdf files to compromise a 
system.
Comment 1 Thomas Biege 2003-07-02 17:03:23 UTC
<!-- SBZ_reproduce  -->
http://www.securityfocus.com/archive/1/327335 
 
Proof-of-Concept code is attached to this posting too.
Comment 2 Thomas Biege 2003-07-04 18:12:09 UTC
Ok, the problem is that we have to wait for an update from Adobe. 
I think we should release the current package that fix' the URL handling 
problem and later, when the buffer overflow ist fixed, release a new one. 
 
Is this ok? 
Comment 3 Johannes Meixner 2003-07-04 22:16:28 UTC
Yes.

Thomas,
A question regarding bug 42583/27584:
Must I submit the package again together with the patchinfo and putonftp file
or is it o.k. if I do nothing (i.e. you would release the new acroread
package by yourself)?
Comment 4 Thomas Biege 2003-07-07 17:34:36 UTC
As soon as it's build by autobuild (I dindt saw a patchinfo/putonftp so far) 
and it's tested I will release the new acroread for fixing the url issue. 
 
In a few minutes I'll send you the p&p files for the buffer overflow 
Comment 5 Thomas Biege 2003-07-07 19:10:36 UTC
Created attachment 13012 [details]
patchinfo
Comment 6 Thomas Biege 2003-07-07 19:11:02 UTC
Created attachment 13013 [details]
putonftp
Comment 7 Thomas Biege 2003-07-11 18:34:14 UTC
More info: 
http://www.securityfocus.com/archive/1/328649 
Comment 8 Johannes Meixner 2003-07-18 15:57:23 UTC
As IBM is measuring our bug processing time and
as I cannot do anything else than wait for an update package from Adobe
I resolve this bug as "REMIND" to keep the bug processing time low.
(For the meaning of "REMIND" see http://bugzilla.suse.de/bug_status.html)

Of course as soon as there is an update package from Adobe at 
ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
(i.e. /mirror/server/ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/)
I will make a new acrobat security update package.
Comment 9 Johannes Meixner 2003-08-11 18:12:59 UTC
<!-- SBZ_reopen -->Reopened by jsmeix@suse.de at Mon Aug 11 12:12:59 2003, took initial reporter thomas@suse.de to cc
Comment 10 Johannes Meixner 2003-08-11 18:12:59 UTC
ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/linux-508.tar.gz
available now.
The README in this arcive reads:
-------------------------------------------------------------
A security patch was applied that solves a problem reported
with long URLs in weblinks which can cause a buffer overrun.
-------------------------------------------------------------

Building new acroread packages - please wait.
Comment 11 Johannes Meixner 2003-08-13 20:51:00 UTC
See bug 43717 for possible problems with version 5.08
Comment 12 Johannes Meixner 2003-08-13 20:52:41 UTC
For testing acroread version 5.08 for 8.2 and STABLE is available here:
http://w3.suse.de/~jsmeix/acroread-5.08-0.i586.82.rpm
http://w3.suse.de/~jsmeix/acroread-5.08-0.i586.STABLE.rpm
Comment 13 Roman Drahtmueller 2003-09-08 21:11:19 UTC
Johannes, an update results in a version upgrade. 
Can we please have a summary which versions of SuSE Linux are affected
by this problem?

Roman.
Comment 14 Johannes Meixner 2003-09-08 22:02:49 UTC
ALL :-(

Reason:
http://www.securityfocus.com/archive/1/327335
reads:
Buffer overflow vulnerability in Adobe Acrobat Reader 5.0.7 and earlier

"and earlier" => ALL

Roman,
please tell me down to which version I should make acroread update packages.
Is it all versions shown here:
http://www.suse.de/de/private/download/updates/index.html
i.e. 7.2, 7.2, 8.0, 8.1, 8.2
Comment 15 Johannes Meixner 2003-09-09 22:28:59 UTC
For SuSE Linux 9.0 Adobe Acrobat Reader 5.0.8 is in STABLE.

I would be grateful if updating  7.2, 7.3, 8.0, 8.1, SLES8 and 8.2
could be postponed until the 9.0 master was finished.
Furthermore this way we know the 9.0 beta test results.
O.k.?
Comment 16 Roman Drahtmueller 2003-09-22 21:36:21 UTC
Yes. Leaving the bug open...
Comment 17 Johannes Meixner 2003-10-02 16:07:00 UTC
Done for 8.2-i386 and 8.1/SLES8/UL-i386.
This was a minor version update from version 5.07 to 5.08


To be done for 8.0-i386, 7.3-i386, 7.2/SLES7-i386:
This requires major changes in spec files and detailed testing
because this will be a major version update from version 4.05 to 5.08

Regarding detailed testing:
According to a customer feedback acroread version 4.05 accepts
German umlauts to fill in forms but version 5.7 (and 5.8) don't - see
http://bugzilla.suse.de/show_bug.cgi?id=28718

Should I really make the major version update for 8.0, 7.3 and 7.2/SLES7 ?
Comment 18 Johannes Meixner 2003-10-02 16:12:30 UTC
Question:
What about having acroread version 5.08 on SP3 for SLES8 ?
Added Ralf to Cc.
Comment 19 Roman Drahtmueller 2003-10-13 23:19:40 UTC
No answer from Ralf. Ralf, please reassign the bug back to security-team@suse.de
once you're done with it.
Next in chain: cs@suse.de. Background: It would be desireable to have the updates
for 7.3 and 8.0, too.
Comment 20 Ralf Flaxa 2003-10-16 17:33:10 UTC
We will just pick up for SP3 just any security update that was released until 
our deadline. So no need to ask me for security updates. Just do and release 
them and we will automatically pick them up if they are ready in time for SP3. 
 
Comment 21 Thomas Biege 2003-12-16 16:38:54 UTC
SP3 released, box packages approved 
Comment 22 Marcus Meissner 2007-06-11 20:59:40 UTC
CVE-2003-0508
Comment 23 Thomas Biege 2009-10-13 19:36:34 UTC
CVE-2003-0508: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)