Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN9-1 : tetex-bin vulnerabilities

Vulnerability Assessment Details

USN9-1 : tetex-bin vulnerabilities

Vulnerability Assessment Summary
tetex-bin vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- libkpathsea-dev
- libkpathsea3
- tetex-bin

Description :

Chris Evans and Marcus Meissner recently discovered several integer
overflow vulnerabilities in xpdf, a viewer for PDF files. Because
tetex-bin contains xpdf code, it is also affected. These
vulnerabilities could be exploited by a possible hacker providing a
specially crafted TeX, LaTeX, or PDF file. Processing such a file with
pdflatex could result in abnormal program termination or the execution
of program code supplied by the attacker.

This bug could be exploited to gain the rights of the user
invoking pdflatex.

Solution :

Upgrade to :
- libkpathsea-dev-2.0.2-21ubuntu0.1 (Ubuntu 4.10)
- libkpathsea3-2.0.2-21ubuntu0.1 (Ubuntu 4.10)
- tetex-bin-2.0.2-21ubuntu0.1 (Ubuntu 4.10)

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

Samsung EVO850 250GB SSD (MZ-7LN250)
Samsung EVO850 250GB SSD (MZ-7LN250) picturewd 4tb external hard drive
wd 4tb external hard drive pictureSeagate 3TB Internal Hard Drive ST3000DM001 OEM 7200 RPM
Seagate 3TB  Internal Hard Drive ST3000DM001 OEM 7200 RPM picture2.5" hard drive 40GB IDE Hitachi


No Discussions have been posted on this vulnerability.