Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 4 2005-1171: poppler


Vulnerability Assessment Details

Fedora Core 4 2005-1171: poppler

Vulnerability Assessment Summary
Check for the version of the poppler package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-1171 (poppler).

Poppler, a PDF rendering library, it's a fork of the xpdf PDF
viewer developed by Derek Noonburg of Glyph and Cog, LLC.

Update Information:

Several more flaws were discovered in Xpdf, which poppler is
based on. A possible hacker could construct a carefully crafted
PDF file that could cause poppler to crash or possibly
execute arbitrary code when opened. The Common
Vulnerabilities and Exposures project assigned the name
CAN-2005-3193 to these issues.



Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

WD Blue 500GB Internal SATA Solid State Drive
$128.0
WD Blue 500GB Internal SATA Solid State Drive pictureIntel 520 Series SSDSC2CW480A310 480GB 2.5" MLC SSD SATA3 Hard Drive
$399.0
Intel 520 Series SSDSC2CW480A310 480GB 2.5Dell 400-AORB / HWX7T 128GB 2.5" MLC SATA SSD Hybrid S3510 Cabled Drive
$119.0
Dell 400-AORB / HWX7T 128GB 2.5Samsung MZMTE512HMHP R7J34 512GB SATA Gen3 / mSATA 6Gbps Solid State Drive / SSD
$299.0
Samsung MZMTE512HMHP R7J34 512GB SATA Gen3 / mSATA 6Gbps Solid State Drive / SSD picture


Discussions

No Discussions have been posted on this vulnerability.