Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA619] DSA-619-1 xpdf


Vulnerability Assessment Details

[DSA619] DSA-619-1 xpdf

Vulnerability Assessment Summary
DSA-619-1 xpdf

Detailed Explanation for this Vulnerability Assessment

An iDEFENSE security researcher discovered a buffer overflow in xpdf,
the portable document format (PDF) suite. A maliciously crafted PDF
file could exploit this problem, resulting in the execution of arbitrary
code.
For the stable distribution (woody) this problem has been fixed in
version 1.00-3.3.
For the unstable distribution (sid) this problem has been fixed in
version 3.00-11.
We recommend that you upgrade your xpdf package immediately.


Solution : http://www.debian.org/security/2004/dsa-619
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

VIA VE-900 Mini ITX Motherboard (VIA Nano X2 L4050 1.4 GHz CPU) HDMI
$29.99
VIA VE-900 Mini ITX Motherboard (VIA Nano X2 L4050 1.4 GHz CPU) HDMI pictureApple Mac Pro 5,1 Dual CPU Tray 3.33GHz W3680 Hexa Core Intel Xeon 8GB DDR3 RAM
$399.99
Apple Mac Pro 5,1 Dual CPU Tray 3.33GHz W3680 Hexa Core Intel Xeon 8GB DDR3 RAM pictureIntel Core i7-6850K LGA 2011 Six-Core Processor
$429.99
Intel Core i7-6850K LGA 2011 Six-Core Processor picture11.6" Chromebook Laptop, Quad-Core Processor, 4GB Ram, 32GB Hard Drive
$154.99
11.6


Discussions

No Discussions have been posted on this vulnerability.