|
Family: Ubuntu Local Security Checks --> Category: infos
USN64-1 : xpdf, cupsys vulnerabilities Vulnerability Scan
Vulnerability Scan Summary xpdf, cupsys vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- cupsys
- cupsys-bsd
- cupsys-client
- libcupsimage2
- libcupsimage2-dev
- libcupsys2-dev
- libcupsys2-gnutls10
- xpdf
- xpdf-common
- xpdf-reader
- xpdf-utils
Description :
A buffer overflow has been found in the xpdf viewer. An insufficient
input validation of the encryption key length could be exploited by an
attacker providing a specially crafted PDF file which, when processed
by xpdf, could result in abnormal program termination or the execution
of attacker supplied program code with the user's rights.
The Common UNIX Printing System (CUPS) uses the same code to print PDF
files. In this case, this bug could be exploited to gain the
rights of the CUPS print server (by default, user cupsys).
Solution :
Upgrade to :
- cupsys-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- cupsys-bsd-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- cupsys-client-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- libcupsimage2-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- libcupsimage2-dev-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- libcupsys2-dev-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- libcupsys2-gnutls10-1.1.20final+cvs20040330-4ubuntu16.4 (Ubuntu 4.10)
- xpdf-3.00-8ubuntu1.4 (Ubuntu 4.1
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|