Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Red Hat Local Security Checks --> Category: infos

RHSA-2002-211: ggv Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the ggv packages

Detailed Explanation for this Vulnerability Test

Updated packages for gv, ggv, and kdegraphics fix a local buffer overflow
when reading malformed PDF or PostScript files.

[Updated 07 Jan 2003]
Added fixed packages for the Itanium (IA64) architecture.

[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1

Gv and ggv are user interfaces for the Ghostscript PostScript(R)
interpreter used to display PostScript and PDF documents on an X Window
System. KGhostview is the PostScript viewer for the K Desktop Environment.

Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier.
A possible hacker can create a carefully crafted malformed PDF or PostScript file
in such a way that when that file is viewed arbitrary commands can be

ggv and kghostview contain code derived from gv and therefore have the same

All users of gv, ggv, and kghostview are advised to upgrade to the errata
packages which contain patches to correct the vulnerability.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.