English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59233
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-542-2 (koffice)
Summary:Ubuntu USN-542-2 (koffice)
Description:
The remote host is missing an update to koffice
announced via advisory USN-542-2.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

USN-542-1 fixed a vulnerability in poppler. This update provides the
corresponding updates for KWord, part of KOffice.

Original advisory details:

Secunia Research discovered several vulnerabilities in poppler. If a
user were tricked into loading a specially crafted PDF file, a remote
attacker could cause a denial of service or possibly execute arbitrary
code with the user's privileges in applications linked against poppler.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
kword 1:1.5.0-0ubuntu9.3

Ubuntu 6.10:
kword 1:1.5.2-0ubuntu2.3

Ubuntu 7.04:
kword 1:1.6.2-0ubuntu1.2

Ubuntu 7.10:
kword 1:1.6.3-0ubuntu5.1

After a standard system upgrade you need to restart KOffice to effect
the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-542-2

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4352
Bugtraq: 20071107 Secunia Research: Xpdf "Stream.cc" Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/483372
http://secunia.com/secunia_research/2007-88/advisory/
Debian Security Information: DSA-1480 (Google Search)
http://www.debian.org/security/2008/dsa-1480
Debian Security Information: DSA-1509 (Google Search)
http://www.debian.org/security/2008/dsa-1509
Debian Security Information: DSA-1537 (Google Search)
http://www.debian.org/security/2008/dsa-1537
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html
http://security.gentoo.org/glsa/glsa-200711-22.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:219
http://www.mandriva.com/security/advisories?name=MDKSA-2007:220
http://www.mandriva.com/security/advisories?name=MDKSA-2007:221
http://www.mandriva.com/security/advisories?name=MDKSA-2007:222
http://www.mandriva.com/security/advisories?name=MDKSA-2007:223
http://www.mandriva.com/security/advisories?name=MDKSA-2007:227
http://www.mandriva.com/security/advisories?name=MDKSA-2007:228
http://www.mandriva.com/security/advisories?name=MDKSA-2007:230
http://www.redhat.com/support/errata/RHSA-2007-1021.html
http://www.redhat.com/support/errata/RHSA-2007-1022.html
http://www.redhat.com/support/errata/RHSA-2007-1025.html
http://www.redhat.com/support/errata/RHSA-2007-1026.html
http://www.redhat.com/support/errata/RHSA-2007-1027.html
http://www.redhat.com/support/errata/RHSA-2007-1029.html
http://www.redhat.com/support/errata/RHSA-2007-1030.html
http://www.redhat.com/support/errata/RHSA-2007-1024.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
SuSE Security Announcement: SUSE-SA:2007:060 (Google Search)
http://www.novell.com/linux/security/advisories/2007_60_pdf.html
http://www.ubuntu.com/usn/usn-542-1
http://www.ubuntu.com/usn/usn-542-2
BugTraq ID: 26367
http://www.securityfocus.com/bid/26367
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9979
http://www.vupen.com/english/advisories/2007/3774
http://www.vupen.com/english/advisories/2007/3775
http://www.vupen.com/english/advisories/2007/3776
http://www.vupen.com/english/advisories/2007/3779
http://www.vupen.com/english/advisories/2007/3786
http://www.securitytracker.com/id?1018905
http://secunia.com/advisories/27260
http://secunia.com/advisories/27553
http://secunia.com/advisories/27573
http://secunia.com/advisories/27574
http://secunia.com/advisories/27575
http://secunia.com/advisories/27577
http://secunia.com/advisories/27578
http://secunia.com/advisories/27615
http://secunia.com/advisories/27637
http://secunia.com/advisories/27599
http://secunia.com/advisories/26503
http://secunia.com/advisories/27618
http://secunia.com/advisories/27619
http://secunia.com/advisories/27640
http://secunia.com/advisories/27641
http://secunia.com/advisories/27642
http://secunia.com/advisories/27656
http://secunia.com/advisories/27632
http://secunia.com/advisories/27645
http://secunia.com/advisories/27636
http://secunia.com/advisories/27634
http://secunia.com/advisories/27658
http://secunia.com/advisories/27705
http://secunia.com/advisories/27721
http://secunia.com/advisories/27724
http://secunia.com/advisories/27743
http://secunia.com/advisories/27856
http://secunia.com/advisories/28043
http://secunia.com/advisories/28812
http://secunia.com/advisories/29104
http://secunia.com/advisories/29604
http://secunia.com/advisories/30168
XForce ISS Database: xpdf-dctstreamread-memory-corruption(38306)
http://xforce.iss.net/xforce/xfdb/38306
Common Vulnerability Exposure (CVE) ID: CVE-2007-5392
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10036
XForce ISS Database: xpdf-dctstreamreset-bo(38303)
http://xforce.iss.net/xforce/xfdb/38303
Common Vulnerability Exposure (CVE) ID: CVE-2007-5393
Debian Security Information: DSA-1408 (Google Search)
http://www.debian.org/security/2007/dsa-1408
http://www.redhat.com/support/errata/RHSA-2007-1023.html
http://www.redhat.com/support/errata/RHSA-2007-1028.html
http://www.redhat.com/support/errata/RHSA-2007-1031.html
http://www.redhat.com/support/errata/RHSA-2007-1051.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9839
http://secunia.com/advisories/27579
http://secunia.com/advisories/27772
http://secunia.com/advisories/27718
XForce ISS Database: xpdf-ccittfaxstreamlookchar-bo(38304)
http://xforce.iss.net/xforce/xfdb/38304
Common Vulnerability Exposure (CVE) ID: CVE-2007-0061
ISS Security Advisory: 20070919 VMWare DHCP Server Remote Code Execution Vulnerabilities
http://www.iss.net/threats/275.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
http://security.gentoo.org/glsa/glsa-200711-23.xml
http://www.ubuntu.com/usn/usn-543-1
BugTraq ID: 25729
http://www.securityfocus.com/bid/25729
http://www.vupen.com/english/advisories/2007/3229
http://www.securitytracker.com/id?1018717
http://secunia.com/advisories/26890
http://secunia.com/advisories/27694
http://secunia.com/advisories/27706
XForce ISS Database: dhcp-malformed-packet-bo(33101)
http://xforce.iss.net/xforce/xfdb/33101
Common Vulnerability Exposure (CVE) ID: CVE-2007-0062
Bugtraq: 20090312 rPSA-2009-0041-1 dhclient dhcp libdhcp4client (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501759/100/0/threaded
http://security.gentoo.org/glsa/glsa-200808-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:153
SuSE Security Announcement: SUSE-SR:2009:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
http://secunia.com/advisories/34263
http://secunia.com/advisories/31396
XForce ISS Database: dhcp-param-overflow(33102)
http://xforce.iss.net/xforce/xfdb/33102
Common Vulnerability Exposure (CVE) ID: CVE-2007-0063
XForce ISS Database: dhcp-param-underflow(33103)
http://xforce.iss.net/xforce/xfdb/33103
Common Vulnerability Exposure (CVE) ID: CVE-2007-4496
BugTraq ID: 25728
http://www.securityfocus.com/bid/25728
http://www.securitytracker.com/id?1018718
Common Vulnerability Exposure (CVE) ID: CVE-2007-4497
BugTraq ID: 25731
http://www.securityfocus.com/bid/25731
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.