Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-066: kdegraphics


Vulnerability Assessment Details

RHSA-2005-066: kdegraphics

Vulnerability Assessment Summary
Check for the version of the kdegraphics packages

Detailed Explanation for this Vulnerability Assessment


Updated kdegraphics packages that resolve security issues in kpdf are now
available.

This update has been rated as having important security impact by the Red
Hat
Security Response Team.

The kdegraphics packages contain applications for the K Desktop Environment
including kpdf, a pdf file viewer.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf that
also affects kpdf due to a shared codebase. A possible hacker could construct a
carefully crafted PDF file that could cause kpdf to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects kpdf due to a shared codebase. A possible hacker could
construct a carefully crafted PDF file that could cause kpdf to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to
this issue.

During a source code audit, Chris Evans and others discovered a number of
integer overflow bugs that affected all versions of Xpdf which also affects
kpdf due to a shared codebase. A possible hacker could construct a carefully
crafted PDF file that could cause kpdf to crash or possibly execute
arbitrary code when opened. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-0888 to this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-066.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

IBM SYSTEM X3650 M5 2.5 SERVER E5-2623V4 2.6GHZ 384GB 7 X 600GB 10K 12G 512E
$11279.0
IBM SYSTEM X3650 M5 2.5 SERVER E5-2623V4 2.6GHZ 384GB 7 X 600GB 10K 12G 512E pictureLENOVO THINKSERVER RD550 E5-2690V3 2.6GHZ 32GB 2 X 900GB 10K SAS
$3209.0
LENOVO THINKSERVER RD550 E5-2690V3 2.6GHZ 32GB 2 X 900GB 10K SAS pictureLenovo ThinkPad T440 14" Core i3 4030U 1.9GHz 450GB 4GB ram comes w2 batteries
$150.0
Lenovo ThinkPad T440 14IBM HS22 BLADECENTER SERVER TWO L5530 2.40GHZ 64GB 2 X 300GB 15K SAS
$939.0
IBM HS22 BLADECENTER SERVER TWO L5530 2.40GHZ 64GB 2 X 300GB 15K SAS picture


Discussions

No Discussions have been posted on this vulnerability.