Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-026: tetex


Vulnerability Assessment Details

RHSA-2005-026: tetex

Vulnerability Assessment Summary
Check for the version of the tetex packages

Detailed Explanation for this Vulnerability Assessment


Updated tetex packages that resolve security issues are now available for
Red
Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat
Security Response Team.

The tetex packages (teTeX) contain an implementation of TeX for Linux or
UNIX systems.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which
also affects teTeX due to a shared codebase. A possible hacker could construct a
carefully crafted PDF file that could cause teTeX to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects teTeX due to a shared codebase. A possible hacker could
construct a carefully crafted PDF file that could cause teTeX to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to
this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-026.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

8GB G.Skill 2133MHz DDR4 SO-DIMM Memory Module (CL15) 1.20V PC4-17000 Ripjaws
$60.0
8GB G.Skill 2133MHz DDR4 SO-DIMM Memory Module (CL15) 1.20V PC4-17000 Ripjaws pictureHynix 2 GB 2Rx8 PC2-6400S-666-12 Memory (HYMP125S64CP8S6ABC)
$9.99
Hynix 2 GB 2Rx8 PC2-6400S-666-12 Memory (HYMP125S64CP8S6ABC) pictureApple MacBook Pro Laptop w/ OS X 10.11 + Intel Core i5 CPU @ 2.6 Ghz, 8 GB Ram,
$699.99
Apple MacBook Pro Laptop w/ OS X 10.11 + Intel Core i5 CPU @ 2.6 Ghz, 8 GB Ram,  pictureCORSAIR Value Select 1GB DDR-400 PC3200 CL3 RAM VS1GB400C3 NEW - IN PACKAGE
$3.48
CORSAIR Value Select 1GB DDR-400 PC3200 CL3 RAM VS1GB400C3 NEW - IN PACKAGE picture


Discussions

No Discussions have been posted on this vulnerability.