CentOS 5 : poppler (CESA-2009:1504)

high Nessus Plugin ID 43804

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated poppler packages that fix multiple security issues and a bug are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.

Multiple integer overflow flaws were found in poppler. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash or, potentially, execute arbitrary code when opened. (CVE-2009-3603, CVE-2009-3608, CVE-2009-3609)

Red Hat would like to thank Chris Rohlf for reporting the CVE-2009-3608 issue.

This update also corrects a regression introduced in the previous poppler security update, RHSA-2009:0480, that prevented poppler from rendering certain PDF documents correctly. (BZ#528147)

Users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected poppler packages.

See Also

http://www.nessus.org/u?41096fc6

http://www.nessus.org/u?08fab85d

Plugin Details

Severity: High

ID: 43804

File Name: centos_RHSA-2009-1504.nasl

Version: 1.16

Type: local

Agent: unix

Published: 1/6/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:poppler-devel, p-cpe:/a:centos:centos:poppler-utils, p-cpe:/a:centos:centos:poppler

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/30/2009

Vulnerability Publication Date: 10/21/2009

Reference Information

CVE: CVE-2009-3603, CVE-2009-3607, CVE-2009-3608, CVE-2009-3609

CWE: 189

RHSA: 2009:1504