Mandriva Linux Security Advisory : poppler (MDVSA-2013:143)

medium Nessus Plugin ID 66155

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been found and corrected in poppler :

poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an invalid memory access in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc (CVE-2013-1788).

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function (CVE-2013-1790).

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 66155

File Name: mandriva_MDVSA-2013-143.nasl

Version: 1.6

Type: local

Published: 4/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64poppler-cpp-devel, p-cpe:/a:mandriva:linux:lib64poppler-cpp0, p-cpe:/a:mandriva:linux:lib64poppler-devel, p-cpe:/a:mandriva:linux:lib64poppler-glib-devel, p-cpe:/a:mandriva:linux:lib64poppler-glib8, p-cpe:/a:mandriva:linux:lib64poppler19, p-cpe:/a:mandriva:linux:poppler, cpe:/o:mandriva:business_server:1, p-cpe:/a:mandriva:linux:lib64poppler-gir0.18

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/15/2013

Reference Information

CVE: CVE-2013-1788, CVE-2013-1790

BID: 58198

MDVSA: 2013:143