RHEL 3 : xpdf (RHSA-2005:059)

High Nessus Plugin ID 16263


The remote Red Hat host is missing a security update.


Updated Xpdf package that fixes a stack based buffer overflow security issue is now available.

Xpdf is an X Window System based viewer for Portable Document Format (PDF) files.

A buffer overflow flaw was found when processing the /Encrypt /Length tag. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to this issue.

Red Hat believes that the Exec-Shield technology (enabled by default since Update 3) will block attempts to exploit this vulnerability on x86 architectures.

All users of the Xpdf package should upgrade to this updated package, which resolves this issue


Update the affected xpdf package.

See Also




Plugin Details

Severity: High

ID: 16263

File Name: redhat-RHSA-2005-059.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2005/01/26

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xpdf, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/01/26

Vulnerability Publication Date: 2005/01/18

Reference Information

CVE: CVE-2005-0064

OSVDB: 13050

RHSA: 2005:059