Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA226] DSA-226-1 xpdf-i


Vulnerability Assessment Details

[DSA226] DSA-226-1 xpdf-i

Vulnerability Assessment Summary
DSA-226-1 xpdf-i

Detailed Explanation for this Vulnerability Assessment

iDEFENSE discovered an integer overflow in the pdftops filter from the
xpdf and xpdf-i packages that can be exploited to gain the rights
of the target user. This can lead to gaining unauthorized access to the
'lp' user if the pdftops program is part of the print filter.
For the current stable distribution (woody) xpdf-i is only a dummy
package and the problem was fixed in xpdf already.
For the old stable distribution (potato) this problem has been
fixed in version 0.90-8.1.
For the unstable distribution (sid) this problem has been
fixed in version 2.01-2.
We recommend that you upgrade your xpdf-i package.


Solution : http://www.debian.org/security/2003/dsa-226
Network Security Threat Level: High

Networks Security ID: 6475

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Toshiba THNSNF128GMCS 128GB mSATA Internal Solid State Drive
$49.99
Toshiba THNSNF128GMCS 128GB mSATA Internal Solid State Drive pictureDell LiteOn 2.5" 512GB SSD Solid State Drive SATA
$200.0
Dell LiteOn 2.5HP Thin Client T610 Plus 2.5" HDD/SSD Drive Caddy (pfsense build)
$11.99
HP Thin Client T610 Plus 2.5SanDisk X300S Laptop Hard Drive 2.5in 128GB SATA 6.0Gb/s Solid State Drive SSD
$23.0
SanDisk X300S Laptop Hard Drive 2.5in 128GB SATA 6.0Gb/s Solid State Drive SSD picture


Discussions

No Discussions have been posted on this vulnerability.