RHEL 2.1 / 3 : xpdf (RHSA-2004:592)

critical Nessus Plugin ID 15632


The remote Red Hat host is missing a security update.


An updated xpdf package that fixes a number of integer overflow security flaws is now available.

Xpdf is an X Window System based viewer for Portable Document Format (PDF) files.

During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of xpdf. An attacker could construct a carefully crafted PDF file that could cause xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0888 to this issue.

Users of xpdf are advised to upgrade to this errata package, which contains a backported patch correcting these issues.


Update the affected xpdf package.

See Also



Plugin Details

Severity: Critical

ID: 15632

File Name: redhat-RHSA-2004-592.nasl

Version: 1.25

Type: local

Agent: unix

Published: 11/4/2004

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xpdf, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 10/27/2004

Vulnerability Publication Date: 1/27/2005

Reference Information

CVE: CVE-2004-0888

RHSA: 2004:592