FreeBSD : xpdf -- stack based buffer overflow (0e43a14d-3f3f-11dc-a79a-0016179b2dd5)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The KDE Team reports :

kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a
vulnerability that can cause a stack based buffer overflow via a PDF
file that exploits an integer overflow in
StreamPredictor::StreamPredictor(). Remotely supplied pdf files can be
used to disrupt the kpdf viewer on the client machine and possibly
execute arbitrary code.

See also :

http://www.kde.org/info/security/advisory-20070730-1.txt
http://www.nessus.org/u?bed9c729

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 25827 (freebsd_pkg_0e43a14d3f3f11dca79a0016179b2dd5.nasl)

Bugtraq ID: 25124

CVE ID: CVE-2007-3387

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now