Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59001
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2007-222-05)
Summary:The remote host is missing an update for the 'xpdf' package(s) announced via the SSA:2007-222-05 advisory.
Description:Summary:
The remote host is missing an update for the 'xpdf' package(s) announced via the SSA:2007-222-05 advisory.

Vulnerability Insight:
New xpdf packages are available for Slackware 9.1, 10.0, 10.1, 10.2, 11.0,
and 12.0 to fix an integer overflow.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[link moved to references]


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/xpdf-3.02pl1-i486-1_slack12.0.tgz:
Upgraded to xpdf-3.02pl1. This fixes an integer overflow that could possibly
be leveraged to run arbitrary code if a malicious PDF file is processed.
For more information, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'xpdf' package(s) on Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3387
1018473
http://www.securitytracker.com/id?1018473
20070801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
20070814 FLEA-2007-0044-1 tetex tetex-dvips tetex-fonts
http://www.securityfocus.com/archive/1/476508/100/0/threaded
20070814 FLEA-2007-0045-1 poppler
http://www.securityfocus.com/archive/1/476519/30/5400/threaded
20070816 FLEA-2007-0046-1 cups
http://www.securityfocus.com/archive/1/476765/30/5340/threaded
25124
http://www.securityfocus.com/bid/25124
26188
http://secunia.com/advisories/26188
26251
http://secunia.com/advisories/26251
26254
http://secunia.com/advisories/26254
26255
http://secunia.com/advisories/26255
26257
http://secunia.com/advisories/26257
26278
http://secunia.com/advisories/26278
26281
http://secunia.com/advisories/26281
26283
http://secunia.com/advisories/26283
26292
http://secunia.com/advisories/26292
26293
http://secunia.com/advisories/26293
26297
http://secunia.com/advisories/26297
26307
http://secunia.com/advisories/26307
26318
http://secunia.com/advisories/26318
26325
http://secunia.com/advisories/26325
26342
http://secunia.com/advisories/26342
26343
http://secunia.com/advisories/26343
26358
http://secunia.com/advisories/26358
26365
http://secunia.com/advisories/26365
26370
http://secunia.com/advisories/26370
26395
http://secunia.com/advisories/26395
26403
http://secunia.com/advisories/26403
26405
http://secunia.com/advisories/26405
26407
http://secunia.com/advisories/26407
26410
http://secunia.com/advisories/26410
26413
http://secunia.com/advisories/26413
26425
http://secunia.com/advisories/26425
26432
http://secunia.com/advisories/26432
26436
http://secunia.com/advisories/26436
26467
http://secunia.com/advisories/26467
26468
http://secunia.com/advisories/26468
26470
http://secunia.com/advisories/26470
26514
http://secunia.com/advisories/26514
26607
http://secunia.com/advisories/26607
26627
http://secunia.com/advisories/26627
26862
http://secunia.com/advisories/26862
26982
http://secunia.com/advisories/26982
27156
http://secunia.com/advisories/27156
27281
http://secunia.com/advisories/27281
27308
http://secunia.com/advisories/27308
27637
http://secunia.com/advisories/27637
30168
http://secunia.com/advisories/30168
40127
http://osvdb.org/40127
ADV-2007-2704
http://www.vupen.com/english/advisories/2007/2704
ADV-2007-2705
http://www.vupen.com/english/advisories/2007/2705
DSA-1347
http://www.debian.org/security/2007/dsa-1347
DSA-1348
http://www.debian.org/security/2007/dsa-1348
DSA-1349
http://www.debian.org/security/2007/dsa-1349
DSA-1350
http://www.debian.org/security/2007/dsa-1350
DSA-1352
http://www.debian.org/security/2007/dsa-1352
DSA-1354
http://www.debian.org/security/2007/dsa-1354
DSA-1355
http://www.debian.org/security/2007/dsa-1355
DSA-1357
http://www.debian.org/security/2007/dsa-1357
GLSA-200709-12
http://security.gentoo.org/glsa/glsa-200709-12.xml
GLSA-200709-17
http://security.gentoo.org/glsa/glsa-200709-17.xml
GLSA-200710-08
http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml
GLSA-200710-20
http://security.gentoo.org/glsa/glsa-200710-20.xml
GLSA-200711-34
http://security.gentoo.org/glsa/glsa-200711-34.xml
GLSA-200805-13
http://security.gentoo.org/glsa/glsa-200805-13.xml
MDKSA-2007:158
http://www.mandriva.com/security/advisories?name=MDKSA-2007:158
MDKSA-2007:159
http://www.mandriva.com/security/advisories?name=MDKSA-2007:159
MDKSA-2007:160
http://www.mandriva.com/security/advisories?name=MDKSA-2007:160
MDKSA-2007:161
http://www.mandriva.com/security/advisories?name=MDKSA-2007:161
MDKSA-2007:162
http://www.mandriva.com/security/advisories?name=MDKSA-2007:162
MDKSA-2007:163
http://www.mandriva.com/security/advisories?name=MDKSA-2007:163
MDKSA-2007:164
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
MDKSA-2007:165
http://www.mandriva.com/security/advisories?name=MDKSA-2007:165
RHSA-2007:0720
http://www.redhat.com/support/errata/RHSA-2007-0720.html
RHSA-2007:0729
http://www.redhat.com/support/errata/RHSA-2007-0729.html
RHSA-2007:0730
http://www.redhat.com/support/errata/RHSA-2007-0730.html
RHSA-2007:0731
http://www.redhat.com/support/errata/RHSA-2007-0731.html
RHSA-2007:0732
http://www.redhat.com/support/errata/RHSA-2007-0732.html
RHSA-2007:0735
http://www.redhat.com/support/errata/RHSA-2007-0735.html
SSA:2007-222-05
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670
SSA:2007-316-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
SUSE-SR:2007:015
http://www.novell.com/linux/security/advisories/2007_15_sr.html
SUSE-SR:2007:016
http://www.novell.com/linux/security/advisories/2007_16_sr.html
USN-496-1
http://www.ubuntu.com/usn/usn-496-1
USN-496-2
http://www.ubuntu.com/usn/usn-496-2
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch
http://bugs.gentoo.org/show_bug.cgi?id=187139
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194
http://sourceforge.net/project/shownotes.php?release_id=535497
http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm
http://www.kde.org/info/security/advisory-20070730-1.txt
https://issues.foresightlinux.org/browse/FL-471
https://issues.rpath.com/browse/RPL-1596
https://issues.rpath.com/browse/RPL-1604
oval:org.mitre.oval:def:11149
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.