This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Alin Rad Pop (Secunia) discovered a number of vulnerabilities in xpdf,
a set of tools for display and conversion of Portable Document Format
(PDF) files. The Common Vulnerabilities and Exposures project
identifies the following three problems :
Inadequate DCT stream validation allows an attacker to
corrupt memory and potentially execute arbitrary code by
supplying a maliciously crafted PDF file.
An integer overflow vulnerability in DCT stream handling
could allow an attacker to overflow a heap buffer,
enabling the execution of arbitrary code.
A buffer overflow vulnerability in xpdf's CCITT image
compression handlers allows overflow on the heap,
allowing an attacker to execute arbitrary code by
supplying a maliciously crafted CCITTFaxDecode filter.
See also :
Upgrade the xpdf packages.
For the stable distribution (etch), these problems have been fixed in
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Debian Local Security Checks
Nessus Plugin ID: 31807 (debian_DSA-1537.nasl)
Bugtraq ID: 26367
CVE ID: CVE-2007-4352CVE-2007-5392CVE-2007-5393
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.