Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-026: tetex


Vulnerability Assessment Details

RHSA-2005-026: tetex

Vulnerability Assessment Summary
Check for the version of the tetex packages

Detailed Explanation for this Vulnerability Assessment


Updated tetex packages that resolve security issues are now available for
Red
Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat
Security Response Team.

The tetex packages (teTeX) contain an implementation of TeX for Linux or
UNIX systems.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which
also affects teTeX due to a shared codebase. A possible hacker could construct a
carefully crafted PDF file that could cause teTeX to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects teTeX due to a shared codebase. A possible hacker could
construct a carefully crafted PDF file that could cause teTeX to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to
this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-026.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell PowerEdge M1000e v1.1 4x M620 2x E5-2690 2.90Ghz 8 Core 128GB 2x 1.6TB SSD
$8250.0
Dell PowerEdge M1000e v1.1 4x M620 2x E5-2690 2.90Ghz 8 Core 128GB 2x 1.6TB SSD  pictureINTEL XEON E5-2690 2.9GHz 8Core 20M 8GT/s FCLGA2011 PROCESSOR SR0L0 not working*
$25.0
INTEL XEON E5-2690 2.9GHz 8Core 20M 8GT/s FCLGA2011 PROCESSOR SR0L0 not working* pictureINTEL XEON E5-2670 2.6GHz 8Core 20M 8GT/s FCLGA2011 PROCESSOR SR0KX not working*
$25.0
INTEL XEON E5-2670 2.6GHz 8Core 20M 8GT/s FCLGA2011 PROCESSOR SR0KX not working* pictureDell PowerEdge R640 Warranty Thru 10-8-2023. 2xBronze 3106 16Cores, H730P, 64GB
$3395.0
Dell PowerEdge R640 Warranty Thru 10-8-2023. 2xBronze 3106 16Cores, H730P, 64GB picture


Discussions

No Discussions have been posted on this vulnerability.