Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-066: kdegraphics


Vulnerability Assessment Details

RHSA-2005-066: kdegraphics

Vulnerability Assessment Summary
Check for the version of the kdegraphics packages

Detailed Explanation for this Vulnerability Assessment


Updated kdegraphics packages that resolve security issues in kpdf are now
available.

This update has been rated as having important security impact by the Red
Hat
Security Response Team.

The kdegraphics packages contain applications for the K Desktop Environment
including kpdf, a pdf file viewer.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf that
also affects kpdf due to a shared codebase. A possible hacker could construct a
carefully crafted PDF file that could cause kpdf to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects kpdf due to a shared codebase. A possible hacker could
construct a carefully crafted PDF file that could cause kpdf to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to
this issue.

During a source code audit, Chris Evans and others discovered a number of
integer overflow bugs that affected all versions of Xpdf which also affects
kpdf due to a shared codebase. A possible hacker could construct a carefully
crafted PDF file that could cause kpdf to crash or possibly execute
arbitrary code when opened. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-0888 to this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-066.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell Poweredge R720 16 Bay Server 2x QC 2.4GHZ 128GB 11x 146GB 10K H710 RPS
$1163.74
Dell Poweredge R720 16 Bay Server 2x QC 2.4GHZ 128GB 11x 146GB 10K H710 RPS pictureHPE PROLIANT DL580 G9 GEN9 SERVER TWO E7-4820V4 2GHZ 768GB 5 X 480GB SSD
$18499.0
HPE PROLIANT DL580 G9 GEN9 SERVER TWO E7-4820V4 2GHZ 768GB 5 X 480GB SSD pictureHPE PROLIANT DL380 G9 Gen9 SERVER TWO E5-2690V3 2.6GHZ 128GB 2 X 1.6TB SSD
$7379.0
HPE PROLIANT DL380 G9 Gen9 SERVER TWO E5-2690V3 2.6GHZ 128GB 2 X 1.6TB SSD pictureDELL POWEREDGE R720 8B 2.5 SERVER E5-2667 2.90GHZ 8GB 3 X 1.6TB SSD H710
$3219.0
DELL POWEREDGE R720 8B 2.5 SERVER E5-2667 2.90GHZ 8GB 3 X 1.6TB SSD H710 picture


Discussions

No Discussions have been posted on this vulnerability.