Description: | Description:
The remote host is missing an update to xpdf announced via advisory USN-14-1.
Markus Meissner discovered even more integer overflow vulnerabilities in xpdf, a viewer for PDF files. These integer overflows can eventually lead to buffer overflows.
The Common UNIX Printing System (CUPS) uses the same code to print PDF files tetex-bin uses the code to generate PDF output and process included PDF files. In any case, these vulnerabilities could be exploited by an attacker providing a specially crafted PDF file which, when processed by CUPS, xpdf, or pdflatex, could result in abnormal program termination or the execution of program code supplied by the attacker.
In the case of CUPS, this bug could be exploited to gain the privileges of the CUPS print server (by default, user cupsys).
In the cases of xpdf and pdflatex, this bug could be exploited to gain the privileges of the user invoking the program.
The following packages are affected:
xpdf-reader xpdf-utils cupsys tetex-bin
Solution: The problem can be corrected by upgrading the affected package(s) to version 1.1.20final+cvs20040330-4ubuntu16.2 (cupsys), version 3.00-8ubuntu1.2 (xpdf-reader, xpdf-utils), or version 2.0.2-21ubuntu0.2 (tetex-bin). In general, a standard system upgrade is sufficient to effect the necessary changes.
http://lists.ubuntu.com/archives/ubuntu-security-announce/2004-November/000016.html
Risk factor : Critical
CVSS Score: 10.0
|