This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated xpdf package that fixes a buffer overflow security issue is
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The xpdf package is an X Window System-based viewer for Portable
Document Format (PDF) files.
A heap based buffer overflow bug was discovered in Xpdf. An attacker
could construct a carefully crafted PDF file that could cause Xpdf to
crash or possibly execute arbitrary code when opened. The Common
Vulnerabilities and Exposures project assigned the name CVE-2006-0301
to this issue.
Users of Xpdf should upgrade to this updated package, which contains a
backported patch to resolve these issues.
Red Hat would like to thank Dirk Mueller for reporting this issue and
providing a patch.
See also :
Update the affected xpdf package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 20898 ()
CVE ID: CVE-2006-0301
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.