RHEL 2.1 / 3 : xpdf (RHSA-2005:213)

High Nessus Plugin ID 17266


The remote Red Hat host is missing a security update.


An updated xpdf package that correctly fixes several integer overflows is now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The xpdf package is an X Window System-based viewer for Portable Document Format (PDF) files.

During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CVE-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). RHSA-2004:592 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue.

All users of xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.


Update the affected xpdf package.

See Also



Plugin Details

Severity: High

ID: 17266

File Name: redhat-RHSA-2005-213.nasl

Version: $Revision: 1.17 $

Type: local

Agent: unix

Published: 2005/03/04

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xpdf, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/03/04

Reference Information

CVE: CVE-2005-0206

RHSA: 2005:213