|
Family: Windows --> Category: infos
DjVu Browser Plug-in Multiple Buffer Overflow Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for DjVu Browser Plug-in < 6.1.1
Detailed Explanation for this Vulnerability Test
Synopsis :
A browser test on the remote Windows host is affected by multiple
buffer overflow vulnerabilities.
Description :
The DjVu Browser Plug-in is installed on the remote Windows host.
This test provides the primary means of viewing DjVu documents,
which are used for publishing scanned books, catalogs, historical
documents, research papers, manuals, etc.
The version of the DjVu Browser Plug-in installed on the remote host
reportedly is affected by several buffer overflows involving various
functions. A possible hacker may be able to leverage these issues to
execute arbitrary code on the remote host subject to the user's
rights if he can trick the user into viewing a specially-crafted
web page.
See also :
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0349.html
http://www.lizardtech.com/products/doc/djvutestrelease.php
Solution :
Upgrade to DjVu Browser Plug-in version 6.1.1 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|