Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-034: xpdf


Vulnerability Assessment Details

RHSA-2005-034: xpdf

Vulnerability Assessment Summary
Check for the version of the xpdf packages

Detailed Explanation for this Vulnerability Assessment


An updated xpdf package that fixes several security issues is now
available.

This update has been rated as having important security impact by the Red
Hat
Security Response Team.

Xpdf is an X Window System based viewer for Portable Document Format (PDF)
files.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An
attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-1125 to this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf. A possible hacker could construct a carefully crafted PDF file that could
cause Xpdf to crash or possibly execute arbitrary code when opened. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-0064 to this issue.

During a source code audit, Chris Evans and others discovered a number of
integer overflow bugs that affected all versions of Xpdf. A possible hacker could
construct a carefully crafted PDF file that could cause Xpdf to crash or
possibly execute arbitrary code when opened. This issue was assigned the
name CVE-2004-0888 by The Common Vulnerabilities and Exposures project
(cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this
issue, but it was found to be incomplete and left 64-bit architectures
vulnerable. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0206 to this issue.

All users of Xpdf should upgrade to this updated package, which contains
backported patches to resolve these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-034.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

T652 ~ Advantech PCM-8060 Motherboard, Socket 1155, No CPU - guaranteed to work
$64.95
T652 ~ Advantech PCM-8060 Motherboard, Socket 1155, No CPU - guaranteed to work pictureAsus P5E 64bit motherboard, Intel Duo Core 2.66GHz CPU, 4GB RAM, fan/tons extras
$200.0
Asus P5E 64bit motherboard, Intel Duo Core 2.66GHz CPU, 4GB RAM, fan/tons extras pictureFor Parts Asus X99-E WS/USB3.1 LGA 2011-v3 Intel X99 SATA 6Gb/s CEB Motherboard
$124.0
For Parts Asus X99-E WS/USB3.1 LGA 2011-v3 Intel X99 SATA 6Gb/s CEB Motherboard pictureHP CQ Desktop H-APRICOT-RS780L-uATX AM3 Motherboard, AMD Athlon II 3.2GHz CPU
$30.0
HP CQ Desktop H-APRICOT-RS780L-uATX AM3 Motherboard, AMD Athlon II 3.2GHz CPU picture


Discussions

No Discussions have been posted on this vulnerability.