Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56277
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-971-1)
Summary:The remote host is missing an update for the Debian 'xpdf' package(s) announced via the DSA-971-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'xpdf' package(s) announced via the DSA-971-1 advisory.

Vulnerability Insight:
SuSE researchers discovered heap overflow errors in xpdf, the Portable Document Format (PDF) suite, that can allow attackers to cause a denial of service by crashing the application or possibly execute arbitrary code.

The old stable distribution (woody) is not affected.

For the stable distribution (sarge) these problems have been fixed in version 3.00-13.5.

For the unstable distribution (sid) these problems have been fixed in version 3.01-6.

We recommend that you upgrade your xpdf packages.

Affected Software/OS:
'xpdf' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0301
1015576
http://securitytracker.com/id?1015576
18274
http://secunia.com/advisories/18274
18677
http://secunia.com/advisories/18677
18707
http://secunia.com/advisories/18707
18825
http://secunia.com/advisories/18825
18826
http://secunia.com/advisories/18826
18834
http://secunia.com/advisories/18834
18837
http://secunia.com/advisories/18837
18838
http://secunia.com/advisories/18838
18839
http://secunia.com/advisories/18839
18860
http://secunia.com/advisories/18860
18862
http://secunia.com/advisories/18862
18864
http://secunia.com/advisories/18864
18875
http://secunia.com/advisories/18875
18882
http://secunia.com/advisories/18882
18908
http://secunia.com/advisories/18908
18913
http://secunia.com/advisories/18913
18983
http://secunia.com/advisories/18983
19377
http://secunia.com/advisories/19377
20060202 [KDE Security Advisory] kpdf/xpdf heap based buffer overflow
http://www.securityfocus.com/archive/1/423899/100/0/threaded
470
http://securityreason.com/securityalert/470
ADV-2006-0389
http://www.vupen.com/english/advisories/2006/0389
ADV-2006-0422
http://www.vupen.com/english/advisories/2006/0422
DSA-971
http://www.debian.org/security/2006/dsa-971
DSA-972
http://www.debian.org/security/2006/dsa-972
DSA-974
http://www.debian.org/security/2006/dsa-974
FEDORA-2006-103
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html
FLSA:175404
http://www.securityfocus.com/archive/1/427990/100/0/threaded
GLSA-200602-04
http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml
GLSA-200602-05
http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml
GLSA-200602-12
http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml
MDKSA-2006:030
http://www.mandriva.com/security/advisories?name=MDKSA-2006:030
MDKSA-2006:031
http://www.mandriva.com/security/advisories?name=MDKSA-2006:031
MDKSA-2006:032
http://www.mandriva.com/security/advisories?name=MDKSA-2006:032
RHSA-2006:0201
http://www.redhat.com/support/errata/RHSA-2006-0201.html
RHSA-2006:0206
http://rhn.redhat.com/errata/RHSA-2006-0206.html
SCOSA-2006.15
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
SSA:2006-045-04
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
SSA:2006-045-09
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
USN-249-1
http://www.ubuntu.com/usn/usn-249-1
http://www.kde.org/info/security/advisory-20060202-1.txt
https://bugzilla.novell.com/show_bug.cgi?id=141242
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
oval:org.mitre.oval:def:10850
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850
xpdf-splash-bo(24391)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24391
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.