![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50425 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 2 FEDORA-2004-584 (tetex) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to tetex announced via advisory FEDORA-2004-584. The updated tetex package fixes a buffer overflow which allows attackers to cause the internal xpdf library used by applications in tetex to crash, and possibly to execute arbitrary code. The Common Vulnerabilities and Exposures projects (cve.mitre.org) has assigned the name CVE-2004-1125 to this issue. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 14bcf3cb94172a8fec405166e904f477 SRPMS/tetex-2.0.2-14FC2.1.src.rpm cf4249542063afad9a64849fa6a5c3b8 x86_64/tetex-2.0.2-14FC2.1.x86_64.rpm 64b36e00a314bfe8e832708364c449ec x86_64/tetex-latex-2.0.2-14FC2.1.x86_64.rpm 662f8c9f9c36e8a2ac646ec4a662b358 x86_64/tetex-xdvi-2.0.2-14FC2.1.x86_64.rpm 56ae4a2055677d35a08df45aa203dedc x86_64/tetex-dvips-2.0.2-14FC2.1.x86_64.rpm 3b08fda494d8db9b182b267c5fac65fc x86_64/tetex-afm-2.0.2-14FC2.1.x86_64.rpm 60b41eb32432ae86eb161e6acbd21312 x86_64/tetex-fonts-2.0.2-14FC2.1.x86_64.rpm 681d654ae8d1487ddc63d2ac664125fc x86_64/tetex-doc-2.0.2-14FC2.1.x86_64.rpm 00f7a420bd92d74d7ce6727dbd75e3a2 x86_64/debug/tetex-debuginfo-2.0.2-14FC2.1.x86_64.rpm dc2bd2ee63df05de037bd49d253c4def i386/tetex-2.0.2-14FC2.1.i386.rpm e3159dfd0e43c77b9af20a5bec5b8f2e i386/tetex-latex-2.0.2-14FC2.1.i386.rpm f23a92930c01795278a1adf6376970a5 i386/tetex-xdvi-2.0.2-14FC2.1.i386.rpm c8de010d4e7ab324a834bbaedfa7fc7f i386/tetex-dvips-2.0.2-14FC2.1.i386.rpm eb9d19121ac9eb703691dc2273593109 i386/tetex-afm-2.0.2-14FC2.1.i386.rpm b3cc536693c014a3d3e0b8dea88486bd i386/tetex-fonts-2.0.2-14FC2.1.i386.rpm f6f5895547d91f495fc84c434ae766d0 i386/tetex-doc-2.0.2-14FC2.1.i386.rpm 28d7cde3b110ea601322898d100f1d91 i386/debug/tetex-debuginfo-2.0.2-14FC2.1.i386.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://fedoranews.org/blog/index.php?p=234 Risk factor : Critical CVSS Score: 9.3 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-1125 BugTraq ID: 12070 http://www.securityfocus.com/bid/12070 Bugtraq: 20041228 KDE Security Advisory: kpdf Buffer Overflow Vulnerability (Google Search) http://marc.info/?t=110378596500001&r=1&w=2 Conectiva Linux advisory: CLA-2005:921 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921 https://bugzilla.fedora.us/show_bug.cgi?id=2352 https://bugzilla.fedora.us/show_bug.cgi?id=2353 http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830 http://www.redhat.com/support/errata/RHSA-2005-013.html http://www.redhat.com/support/errata/RHSA-2005-018.html http://www.redhat.com/support/errata/RHSA-2005-026.html http://www.redhat.com/support/errata/RHSA-2005-034.html http://www.redhat.com/support/errata/RHSA-2005-053.html http://www.redhat.com/support/errata/RHSA-2005-057.html http://www.redhat.com/support/errata/RHSA-2005-066.html http://www.redhat.com/support/errata/RHSA-2005-354.html SCO Security Bulletin: SCOSA-2005.42 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt http://securitytracker.com/id?1012646 http://secunia.com/advisories/17277 SuSE Security Announcement: SUSE-SR:2005:001 (Google Search) http://www.novell.com/linux/security/advisories/2005_01_sr.html https://usn.ubuntu.com/50-1/ XForce ISS Database: xpdf-gfx-doimage-bo(18641) https://exchange.xforce.ibmcloud.com/vulnerabilities/18641 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |