RHEL 3 : xpdf (RHSA-2005:059)

high Nessus Plugin ID 16263

Synopsis

The remote Red Hat host is missing a security update.

Description

Updated Xpdf package that fixes a stack based buffer overflow security issue is now available.

Xpdf is an X Window System based viewer for Portable Document Format (PDF) files.

A buffer overflow flaw was found when processing the /Encrypt /Length tag. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to this issue.

Red Hat believes that the Exec-Shield technology (enabled by default since Update 3) will block attempts to exploit this vulnerability on x86 architectures.

All users of the Xpdf package should upgrade to this updated package, which resolves this issue

Solution

Update the affected xpdf package.

See Also

https://access.redhat.com/security/cve/cve-2005-0064

http://www.nessus.org/u?d0de7eb8

https://access.redhat.com/errata/RHSA-2005:059

Plugin Details

Severity: High

ID: 16263

File Name: redhat-RHSA-2005-059.nasl

Version: 1.25

Type: local

Agent: unix

Published: 1/26/2005

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xpdf, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 1/26/2005

Vulnerability Publication Date: 5/2/2005

Reference Information

CVE: CVE-2005-0064

RHSA: 2005:059