RHEL 3 : xpdf (RHSA-2005:059)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated Xpdf package that fixes a stack based buffer overflow security
issue is now available.

Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files.

A buffer overflow flaw was found when processing the /Encrypt /Length
tag. An attacker could construct a carefully crafted PDF file that
could cause Xpdf to crash or possibly execute arbitrary code when
opened. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0064 to this issue.

Red Hat believes that the Exec-Shield technology (enabled by default
since Update 3) will block attempts to exploit this vulnerability on
x86 architectures.

All users of the Xpdf package should upgrade to this updated package,
which resolves this issue

See also :

https://www.redhat.com/security/data/cve/CVE-2005-0064.html
http://www.nessus.org/u?d0de7eb8
http://rhn.redhat.com/errata/RHSA-2005-059.html

Solution :

Update the affected xpdf package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 16263 ()

Bugtraq ID:

CVE ID: CVE-2005-0064