How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Xpdf packages are available to fix a vulnerability where a
malicious PDF document could run arbitrary code.
[Updated 06 Feb 2003] Added fixed packages for Advanced Workstation
Xpdf is an X Window System based viewer for Portable Document Format
During an audit of CUPS, a printing system, Zen Parsec found an
integer overflow vulnerability in the pdftops filter. Since the code
for pdftops is taken from the Xpdf project, all versions of Xpdf
including 2.01 are also vulnerable to this issue. An attacker could
create a malicious PDF file that would execute arbitrary code as the
user who used Xpdf to view it.
All users of Xpdf are advised to upgrade to these errata packages
which contain a patch to correct this issue.
See also :
Update the affected xpdf package.
Risk factor :
High / CVSS Base Score : 7.2
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12345 ()
CVE ID: CVE-2002-1384
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.