![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50430 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 3 FEDORA-2004-585 (tetex) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to tetex announced via advisory FEDORA-2004-585. The updated tetex package fixes a buffer overflow which allows attackers to cause the internal xpdf library used by applications in tetex to crash, and possibly to execute arbitrary code. The Common Vulnerabilities and Exposures projects (cve.mitre.org) has assigned the name CVE-2004-1125 to this issue. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ eeffe10a8d42f6269f2e7a9225b76108 SRPMS/tetex-2.0.2-21.2.src.rpm 2e3fe2e80094656b2a571b424f3bc002 x86_64/tetex-2.0.2-21.2.x86_64.rpm e8fac4727a41f4cd97442e2e84fcc188 x86_64/tetex-latex-2.0.2-21.2.x86_64.rpm 94c4217e1b73293706b45880fbc72e39 x86_64/tetex-xdvi-2.0.2-21.2.x86_64.rpm aef9eb3e2c213e6512b6c63c767893e0 x86_64/tetex-dvips-2.0.2-21.2.x86_64.rpm b978a97c56edd0f8473646553912292f x86_64/tetex-afm-2.0.2-21.2.x86_64.rpm a350d6ebb4130fc67584f9dcb9aa8b34 x86_64/tetex-fonts-2.0.2-21.2.x86_64.rpm a6435f2dadbce2192226bf1d6c751f7b x86_64/tetex-doc-2.0.2-21.2.x86_64.rpm 94442d1626174498758f2f7999c31b1d x86_64/debug/tetex-debuginfo-2.0.2-21.2.x86_64.rpm e47da926c1a225d73724786e1d708989 i386/tetex-2.0.2-21.2.i386.rpm 774fa2bd414a297a92101000d5f3a980 i386/tetex-latex-2.0.2-21.2.i386.rpm 83e020d800b3d6faee79f4955c148083 i386/tetex-xdvi-2.0.2-21.2.i386.rpm c4e3699330d79b05b99ffedb22ee6f2a i386/tetex-dvips-2.0.2-21.2.i386.rpm 50fd2ac5818c548f7749e73b11f86b6b i386/tetex-afm-2.0.2-21.2.i386.rpm 584b54a8d6c2241b49b9b7e38e7c0268 i386/tetex-fonts-2.0.2-21.2.i386.rpm d151205d1990b1a09641e279e7f10aa3 i386/tetex-doc-2.0.2-21.2.i386.rpm 58f207404845c4de68c7ce0658d606e8 i386/debug/tetex-debuginfo-2.0.2-21.2.i386.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://fedoranews.org/blog/index.php?p=235 Risk factor : Critical CVSS Score: 9.3 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-1125 BugTraq ID: 12070 http://www.securityfocus.com/bid/12070 Bugtraq: 20041228 KDE Security Advisory: kpdf Buffer Overflow Vulnerability (Google Search) http://marc.info/?t=110378596500001&r=1&w=2 Conectiva Linux advisory: CLA-2005:921 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921 https://bugzilla.fedora.us/show_bug.cgi?id=2352 https://bugzilla.fedora.us/show_bug.cgi?id=2353 http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830 http://www.redhat.com/support/errata/RHSA-2005-013.html http://www.redhat.com/support/errata/RHSA-2005-018.html http://www.redhat.com/support/errata/RHSA-2005-026.html http://www.redhat.com/support/errata/RHSA-2005-034.html http://www.redhat.com/support/errata/RHSA-2005-053.html http://www.redhat.com/support/errata/RHSA-2005-057.html http://www.redhat.com/support/errata/RHSA-2005-066.html http://www.redhat.com/support/errata/RHSA-2005-354.html SCO Security Bulletin: SCOSA-2005.42 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt http://securitytracker.com/id?1012646 http://secunia.com/advisories/17277 SuSE Security Announcement: SUSE-SR:2005:001 (Google Search) http://www.novell.com/linux/security/advisories/2005_01_sr.html https://usn.ubuntu.com/50-1/ XForce ISS Database: xpdf-gfx-doimage-bo(18641) https://exchange.xforce.ibmcloud.com/vulnerabilities/18641 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |