How to Buy
This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Several vulnerabilities have been discovered in xpdf code that is
embedded in koffice, an integrated office suite for KDE. These flaws
could allow an attacker to execute arbitrary code by inducing the user
to import a specially crafted PDF document. The Common Vulnerabilities
and Exposures project identifies the following problems :
Array index error in the
DCTStream::readProgressiveDataUnit method in
xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler,
teTeX, KDE, KOffice, CUPS, and other products, allows
remote attackers to trigger memory corruption and
execute arbitrary code via a crafted PDF file.
Integer overflow in the DCTStream::reset method in
xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers
to execute arbitrary code via a crafted PDF file,
resulting in a heap-based buffer overflow.
Heap-based buffer overflow in the
CCITTFaxStream::lookChar method in xpdf/Stream.cc in
Xpdf 3.02p11 allows remote attackers to execute
arbitrary code via a PDF file that contains a crafted
Updates for the old stable distribution (sarge) will be made available
as soon as possible.
See also :
Upgrade the koffice package.
For the stable distribution (etch), these problems have been fixed in
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Debian Local Security Checks
Nessus Plugin ID: 31170 (debian_DSA-1509.nasl)
Bugtraq ID: 26367
CVE ID: CVE-2007-4352CVE-2007-5392CVE-2007-5393
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.