This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200903-05
(PDFjam: Multiple vulnerabilities)
Martin Vaeth reported multiple untrusted search path vulnerabilities
Marcus Meissner of the SUSE Security Team reported that
temporary files are created with a predictable name (CVE-2008-5743).
A local attacker could place a specially crafted Python module in the
current working directory or the /var/tmp directory, and entice a user
to run the PDFjam scripts, leading to the execution of arbitrary code
with the privileges of the user running the application. A local
attacker could also leverage symlink attacks to overwrite arbitrary
There is no known workaround at this time.
See also :
All PDFjam users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/pdfjam-1.20-r1'
Risk factor :
Medium / CVSS Base Score : 6.9