Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2004-358: gpdf


Vulnerability Assessment Details

Fedora Core 2 2004-358: gpdf

Vulnerability Assessment Summary
Check for the version of the gpdf package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-358 (gpdf).

This is GPdf, a viewer for Portable Document Format (PDF) files for
GNOME. GPdf is based on the Xpdf program and uses additional GNOME
libraries for better desktop integration.

GPdf includes the gpdf application, a Bonobo control for PDF display
which can be embedded in Nautilus, and a Nautilus property page for
PDF files.

Update Information:

Update to gpdf 2.8.0, which fixes the CVE-2004-0888 security issue.
Also fixes:
#rh127803# crash with mailto: links
#rh132469# crash with remote documents using gnome-vfs


Solution : http://www.fedoranews.org/updates/FEDORA-2004-358.shtml
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

AS-IS Samsung Galaxy Tab S2 32GB, Wi-Fi only, 9.7 inch - Black SM-T813NZKSXAR
$0.99
AS-IS Samsung Galaxy Tab S2 32GB, Wi-Fi only, 9.7 inch - Black SM-T813NZKSXAR pictureSamsung DP 700A3D All in One i5-3470T 2.9GHz 6GB RAM 1TB Hard Drive Win10 Touch
$199.99
Samsung DP 700A3D All in One i5-3470T 2.9GHz 6GB RAM 1TB Hard Drive Win10 Touch pictureSamsung 840 EVO 120GB Solid State SATA Drive (2.5”)
$45.0
Samsung 840 EVO 120GB Solid State SATA Drive (2.5”) picture


Discussions

No Discussions have been posted on this vulnerability.