RHEL 4 : gpdf (RHSA-2009:1503)

high Nessus Plugin ID 42162

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated gpdf package that fixes multiple security issues is now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red Hat Security Response Team.

GPdf is a viewer for Portable Document Format (PDF) files.

Multiple integer overflow flaws were found in GPdf. An attacker could create a malicious PDF file that would cause GPdf to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188, CVE-2009-3604, CVE-2009-3608, CVE-2009-3609)

Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604 issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.

Users are advised to upgrade to this updated package, which contains a backported patch to correct these issues.

Solution

Update the affected gpdf package.

See Also

https://access.redhat.com/security/cve/cve-2009-0791

https://access.redhat.com/security/cve/cve-2009-1188

https://access.redhat.com/security/cve/cve-2009-3604

https://access.redhat.com/security/cve/cve-2009-3608

https://access.redhat.com/security/cve/cve-2009-3609

https://access.redhat.com/errata/RHSA-2009:1503

Plugin Details

Severity: High

ID: 42162

File Name: redhat-RHSA-2009-1503.nasl

Version: 1.24

Type: local

Agent: unix

Published: 10/16/2009

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:gpdf, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/15/2009

Vulnerability Publication Date: 4/23/2009

Reference Information

CVE: CVE-2009-0791, CVE-2009-1188, CVE-2009-3604, CVE-2009-3608, CVE-2009-3609

RHSA: 2009:1503

CWE: 189, 399