This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Xpdf packages are available that fix a vulnerability where a
malicious PDF document could run arbitrary code.
[Updated 21 July 2003] Updated packages are now available, as the
original errata packages did not fix all possible ways of exploiting
Xpdf is an X Window System based viewer for Portable Document Format
Martyn Gilmore discovered a flaw in various PDF viewers and readers.
An attacker can embed malicious external-type hyperlinks that if
activated or followed by a victim can execute arbitrary shell
commands. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0434 to this issue.
All users of Xpdf are advised to upgrade to these errata packages,
which contain a patch correcting this issue.
See also :
Update the affected xpdf package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12402 ()
CVE ID: CVE-2003-0434
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.