This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Xpdf package that fixes a stack based buffer overflow security
issue is now available.
Xpdf is an X Window System based viewer for Portable Document Format
A buffer overflow flaw was found when processing the /Encrypt /Length
tag. An attacker could construct a carefully crafted PDF file that
could cause Xpdf to crash or possibly execute arbitrary code when
opened. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0064 to this issue.
Red Hat believes that the Exec-Shield technology (enabled by default
since Update 3) will block attempts to exploit this vulnerability on
All users of the Xpdf package should upgrade to this updated package,
which resolves this issue
See also :
Update the affected xpdf package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 16263 ()
CVE ID: CVE-2005-0064
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.