Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2004-573: xpdf


Vulnerability Assessment Details

Fedora Core 3 2004-573: xpdf

Vulnerability Assessment Summary
Check for the version of the xpdf package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-573 (xpdf).

Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files. Xpdf is a small and efficient program which uses
standard X fonts.

Update Information:

This package fixes a buffer overflow which permits attackers to cause
the xpdf application to crash, and possibly to execute arbitrary code.
The Common Vulnerabilities and Exposures projects (cve.mitre.org) has
assigned
the name CVE-2004-1125 to this issue.



Solution : http://www.fedoranews.org/blog/index.php?p=229
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

512GB USB 2.0 Flash Drive Memory Stick Storage Pen Stainless Keychain
$15.99
512GB USB 2.0 Flash Drive Memory Stick Storage Pen Stainless Keychain pictureMaxell USB Basic 16 GB USB 2.0 Flash Drive 503003 (Black)
$73.1
Maxell USB Basic 16 GB USB 2.0 Flash Drive 503003 (Black) pictureMaxell USB Style 4 GB USB 2.0 Flash Drive 503301 (Black)
$37.24
Maxell USB Style 4 GB USB 2.0 Flash Drive 503301 (Black) pictureSuper Talent Pico-C 32 GB USB 2.0 Flash Drive STU32GPCS (Silver)
$23.77
Super Talent Pico-C 32 GB USB 2.0 Flash Drive STU32GPCS (Silver) picture


Discussions

No Discussions have been posted on this vulnerability.