CentOS 4 : xpdf (CESA-2006:0201)

high Nessus Plugin ID 21984

Synopsis

The remote CentOS host is missing a security update.

Description

An updated xpdf package that fixes a buffer overflow security issue is now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The xpdf package is an X Window System-based viewer for Portable Document Format (PDF) files.

A heap based buffer overflow bug was discovered in Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0301 to this issue.

Users of Xpdf should upgrade to this updated package, which contains a backported patch to resolve these issues.

Red Hat would like to thank Dirk Mueller for reporting this issue and providing a patch.

Solution

Update the affected xpdf package.

See Also

http://www.nessus.org/u?d9512edc

http://www.nessus.org/u?3ea5c0be

http://www.nessus.org/u?d5a98334

Plugin Details

Severity: High

ID: 21984

File Name: centos_RHSA-2006-0201.nasl

Version: 1.17

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:xpdf

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 2/13/2006

Vulnerability Publication Date: 1/30/2006

Reference Information

CVE: CVE-2006-0301

RHSA: 2006:0201