Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0112
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0112)
Resumen:The remote host is missing an update for the 'xpdf' package(s) announced via the MGASA-2021-0112 advisory.
Descripción:Summary:
The remote host is missing an update for the 'xpdf' package(s) announced via the MGASA-2021-0112 advisory.

Vulnerability Insight:
In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state)
SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack->cache`, which
causes an `heap-use-after-free` problem. The codes of a previous fix for nested
Type 3 characters wasn't correctly handling the case where a Type 3 char
referred to another char in the same Type 3 font (CVE-2020-25725).

Xpdf 4.02 allows stack consumption because of an incorrect subroutine reference
in a Type 1C font charstring, related to the FoFiType1C::getOp() function
(CVE-2020-35376).

Affected Software/OS:
'xpdf' package(s) on Mageia 7, Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-25725
FEDORA-2021-013d9a30e0
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLOYVJSM54IL6I5RY4QTJGRS7PIEG44X/
FEDORA-2021-4a437fe032
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZUU5QG6SSVRTKZTR3A72LDRVZETEI63/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25725
https://forum.xpdfreader.com/viewtopic.php?f=3&t=41915
Common Vulnerability Exposure (CVE) ID: CVE-2020-35376
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLOYVJSM54IL6I5RY4QTJGRS7PIEG44X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZUU5QG6SSVRTKZTR3A72LDRVZETEI63/
https://forum.xpdfreader.com/viewtopic.php?f=3&t=42066
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.