|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN236-1 : xpdf, poppler, cupsys, tetex-bin vulnerabilities Vulnerability Assessment Details
|
USN236-1 : xpdf, poppler, cupsys, tetex-bin vulnerabilities |
||
xpdf, poppler, cupsys, tetex-bin vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - cupsys - cupsys-bsd - cupsys-client - libcupsimage2 - libcupsimage2-dev - libcupsys2-dev - libcupsys2-gnutls10 - libkpathsea-dev - libkpathsea3 - libpoppler-dev - libpoppler-glib-dev - libpoppler-qt-dev - libpoppler0c2 - libpoppler0c2-glib - libpoppler0c2-qt - poppler-utils - tetex-bin - xpdf - xpdf-common - xpdf-reader - xpdf-utils Description : Chris Evans discovered several integer overflows in the XPDF code, which is present in xpdf, the Poppler library, and tetex-bin. By tricking an user into opening a specially crafted PDF file, an attacker could exploit this to execute arbitrary code with the rights of the application that processes the document. The CUPS printing system also uses XPDF code to convert PDF files to PostScript. By attempting to print such a crafted PDF file, a remote attacker could execute arbitrary code with the rights of the printer server (user 'cupsys'). Solution : Upgrade to : - cupsys-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - cupsys-bsd-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - cupsys-client-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - libcupsimage2-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - libcupsimage2-dev-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - libcupsys2-dev-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - libcupsys2-gnutls10-1.1.20final+cvs20040330-4ubuntu16.10 (Ubuntu 4.10) - libkpathsea-dev-2.0.2-30u [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
~OVERSTOCK~ 15.6" Lenovo ThinkPad Laptop: Intel i5 8GB RAM 256GB SSD Win 10
$169.99
New Palmrest Keyboard Touchpad For Lenovo Yoga 7-14ITL5 Dark Moss 5CB1A08879 US
$108.59
Geunine Lenovo Yoga 7 16IAH7 82UF Palmrest+BL Keyboard Upper case assembly
$138.99
Lenovo Legion 5 15.6" Gaming Laptop AMD R7 7735HS RTX 4060 16GB RAM 512GB SSD
$849.99
Lenovo IdeaPad Pro 5i, 16″, i5-13500H, 16 GB, 1 TB SSD, RTX 3050, 120Hz, Laptop
$709.99
Lenovo 300e 11.6" 2in1 Touchscreen Laptop Computer 4GB RAM 64GB SSD Windows 10
$83.99
Lenovo ThinkPad E560 Intel Core i5-6200U 2.3GHz 8GB RAM 500GB HDD W10P w/Charger
$74.99
Lenovo IdeaPad 3i 15.6" Laptop Intel Core i3-1215U 8GB Ram 256GB SSD W11H
$219.99
Lenovo Notebook ThinkPad L14 AMD Gen 3 Laptop, 14" FHD IPS 60Hz
$409.99
Lenovo Notebook ThinkPad T14s Gen 4 Laptop, 14" IPS 60Hz, i7-1355U,
$704.63
|
||
No Discussions have been posted on this vulnerability. |