RHEL 2.1 : ggv (RHSA-2002:211)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated packages for gv, ggv, and kdegraphics fix a local buffer
overflow when reading malformed PDF or PostScript files.

[Updated 07 Jan 2003] Added fixed packages for the Itanium (IA64)

[Updated 06 Feb 2003] Added fixed packages for Advanced Workstation

Gv and ggv are user interfaces for the Ghostscript PostScript(R)
interpreter used to display PostScript and PDF documents on an X
Window System. KGhostview is the PostScript viewer for the K Desktop

Zen Parse found a local buffer overflow in gv version 3.5.8 and
earlier. An attacker can create a carefully crafted malformed PDF or
PostScript file in such a way that when that file is viewed arbitrary
commands can be executed.

ggv and kghostview contain code derived from gv and therefore have the
same vulnerability.

All users of gv, ggv, and kghostview are advised to upgrade to the
errata packages which contain patches to correct the vulnerability.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12325 ()

Bugtraq ID:

CVE ID: CVE-2002-0838

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now