|
Family: Ubuntu Local Security Checks --> Category: infos
USN163-1 : xpdf vulnerability Vulnerability Scan
Vulnerability Scan Summary xpdf vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- kamera
- kcoloredit
- kdegraphics
- kdegraphics-dev
- kdegraphics-kfile-tests
- kdvi
- kfax
- kgamma
- kghostview
- kiconedit
- kmrml
- kolourpaint
- kooka
- kpdf
- kpovmodeler
- kruler
- ksnapshot
- ksvg
- kuickshow
- kview
- kviewshell
- libkscan-dev
- libkscan1
- xpdf
- xpdf-common
- xpdf-reader
- xpdf-utils
Description :
xpdf and kpdf did not sufficiently verify the validity of the "loca"
table in PDF files, a table that contains glyph description
information for embedded TrueType fonts. After detecting the broken
table, xpdf attempted to reconstruct the information in it, which
caused the generation of a huge temporary file that quickly filled up
available disk space and rendered the application unresponsive.
The CUPS printing system in Ubuntu 5.04 uses the xpdf-utils package to
convert PDF files to PostScript. By attempting to print such a crafted
PDF file, a remote attacker could cause a Denial of Service in a print
server. The CUPS system in Ubuntu 4.10 is not vulnerable against this
attack.
Solution :
Upgrade to :
- kamera-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kcoloredit-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kdegraphics-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kdegraphics-dev-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kdegraphics-kfile-tests-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kdvi-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kfax-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kgamma-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kghostview-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kiconedit-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kmrml-3.4.0-0ubuntu3.1 (Ubuntu 5.04)
- kolourpaint-3.4.
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|