Vulnerabilities > CVE-2007-3387 - Integer Overflow or Wraparound vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Forced Integer Overflow This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200710-20.NASL description The remote host is affected by the vulnerability described in GLSA-200710-20 (PDFKit, ImageKits: Buffer overflow) Maurycy Prodeus discovered an integer overflow vulnerability possibly leading to a stack-based buffer overflow in the XPDF code which PDFKit is based on. ImageKits also contains a copy of PDFKit. Impact : By enticing a user to view a specially crafted PDF file with a viewer based on ImageKits or PDFKit such as Gentoo last seen 2020-06-01 modified 2020-06-02 plugin id 27518 published 2007-10-19 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/27518 title GLSA-200710-20 : PDFKit, ImageKits: Buffer overflow code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200710-20. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(27518); script_version("1.18"); script_cvs_date("Date: 2019/08/02 13:32:44"); script_cve_id("CVE-2007-3387"); script_xref(name:"GLSA", value:"200710-20"); script_name(english:"GLSA-200710-20 : PDFKit, ImageKits: Buffer overflow"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200710-20 (PDFKit, ImageKits: Buffer overflow) Maurycy Prodeus discovered an integer overflow vulnerability possibly leading to a stack-based buffer overflow in the XPDF code which PDFKit is based on. ImageKits also contains a copy of PDFKit. Impact : By enticing a user to view a specially crafted PDF file with a viewer based on ImageKits or PDFKit such as Gentoo's ViewPDF, a remote attacker could cause an overflow, potentially resulting in the execution of arbitrary code with the privileges of the user running the application. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200709-12" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200710-20" ); script_set_attribute( attribute:"solution", value: "PDFKit and ImageKits are not maintained upstream, so the packages were masked in Portage. We recommend that users unmerge PDFKit and ImageKits: # emerge --unmerge gnustep-libs/pdfkit # emerge --unmerge gnustep-libs/imagekits As an alternative, users should upgrade their systems to use PopplerKit instead of PDFKit and Vindaloo instead of ViewPDF." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:imagekits"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:pdfkit"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/10/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/19"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"gnustep-libs/imagekits", unaffected:make_list(), vulnerable:make_list("le 0.6"))) flag++; if (qpkg_check(package:"gnustep-libs/pdfkit", unaffected:make_list(), vulnerable:make_list("le 0.9_pre062906"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "PDFKit / ImageKits"); }
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-496-1.NASL description Derek Noonburg discovered an integer overflow in the Xpdf function StreamPredictor::StreamPredictor(). By importing a specially crafted PDF file into KWord, this could be exploited to run arbitrary code with the user last seen 2020-06-01 modified 2020-06-02 plugin id 28098 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28098 title Ubuntu 6.06 LTS / 6.10 / 7.04 : koffice vulnerability (USN-496-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-496-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(28098); script_version("1.19"); script_cvs_date("Date: 2019/08/02 13:33:01"); script_cve_id("CVE-2007-3387"); script_bugtraq_id(25124); script_xref(name:"USN", value:"496-1"); script_name(english:"Ubuntu 6.06 LTS / 6.10 / 7.04 : koffice vulnerability (USN-496-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "Derek Noonburg discovered an integer overflow in the Xpdf function StreamPredictor::StreamPredictor(). By importing a specially crafted PDF file into KWord, this could be exploited to run arbitrary code with the user's privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/496-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:karbon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kchart"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kexi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kformula"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kivio"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kivio-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-dbg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-doc-html"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koffice-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:koshell"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kplato"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kpresenter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kpresenter-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:krita"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:krita-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kspread"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kthesaurus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kugar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kword"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kword-data"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.06:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.04"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/10"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(6\.06|6\.10|7\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 6.06 / 6.10 / 7.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"6.06", pkgname:"karbon", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kchart", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kexi", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kformula", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kivio", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kivio-data", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-data", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-dbg", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-dev", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-doc", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-doc-html", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koffice-libs", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"koshell", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kplato", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kpresenter", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kpresenter-data", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"krita", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"krita-data", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kspread", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kthesaurus", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kugar", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kword", pkgver:"1:1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"kword-data", pkgver:"1.5.0-0ubuntu9.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"karbon", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kchart", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kexi", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kformula", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kivio", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kivio-data", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-data", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-dbg", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-dev", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-doc", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-doc-html", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koffice-libs", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"koshell", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kplato", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kpresenter", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kpresenter-data", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"krita", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"krita-data", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kspread", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kthesaurus", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kugar", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kword", pkgver:"1:1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"kword-data", pkgver:"1.5.2-0ubuntu2.2")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"karbon", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kchart", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kexi", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kformula", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kivio", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kivio-data", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-data", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-dbg", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-dev", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-doc", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-doc-html", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koffice-libs", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"koshell", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kplato", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kpresenter", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kpresenter-data", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"krita", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"krita-data", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kspread", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kthesaurus", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kugar", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kword", pkgver:"1:1.6.2-0ubuntu1.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kword-data", pkgver:"1.6.2-0ubuntu1.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "karbon / kchart / kexi / kformula / kivio / kivio-data / koffice / etc"); }
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200709-17.NASL description The remote host is affected by the vulnerability described in GLSA-200709-17 (teTeX: Multiple buffer overflows) Mark Richters discovered a buffer overflow in the open_sty() function in file mkind.c. Other vulnerabilities have also been discovered in the same file but might not be exploitable (CVE-2007-0650). Tetex also includes vulnerable code from GD library (GLSA 200708-05), and from Xpdf (CVE-2007-3387). Impact : A remote attacker could entice a user to process a specially crafted PNG, GIF or PDF file, or to execute last seen 2020-06-01 modified 2020-06-02 plugin id 26215 published 2007-10-03 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26215 title GLSA-200709-17 : teTeX: Multiple buffer overflows NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0720.NASL description Updated CUPS packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Maurycy Prodeus discovered an integer overflow flaw in the way CUPS processes PDF files. An attacker could create a malicious PDF file that could potentially execute arbitrary code when printed. (CVE-2007-3387) All users of CUPS should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25812 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25812 title CentOS 3 / 4 / 5 : cups (CESA-2007:0720) NASL family Fedora Local Security Checks NASL id FEDORA_2007-669.NASL description - Fri Aug 10 2007 Jindrich Novy <jnovy at redhat.com> 3.0-35 - backport upstream fix for xpdf integer overflow CVE-2007-3387 (#251515) - don last seen 2020-06-01 modified 2020-06-02 plugin id 25913 published 2007-08-21 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25913 title Fedora Core 6 : tetex-3.0-35.fc6 (2007-669) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-162.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause kpdf to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25894 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25894 title Mandrake Linux Security Advisory : kdegraphics (MDKSA-2007:162) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1352.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. pdfkit.framework includes a copy of the xpdf code and required an update as well. last seen 2020-06-01 modified 2020-06-02 plugin id 25860 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25860 title Debian DSA-1352-1 : pdfkit.framework - integer overflow NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-165.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause cups to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25923 published 2007-08-21 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25923 title Mandrake Linux Security Advisory : cups (MDKSA-2007:165) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1348.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. poppler includes a copy of the xpdf code and required an update as well. The oldstable distribution (sarge) doesn last seen 2020-06-01 modified 2020-06-02 plugin id 25856 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25856 title Debian DSA-1348-1 : poppler - integer overflow NASL family Scientific Linux Local Security Checks NASL id SL_20070730_CUPS_ON_SL5_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the way CUPS processes PDF files. An attacker could create a malicious PDF file that could potentially execute arbitrary code when printed. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60232 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60232 title Scientific Linux Security Update : cups on SL5.x, SL4.x, SL3.x i386/x86_64 NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-160.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause pdftohtml to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25892 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25892 title Mandrake Linux Security Advisory : pdftohtml (MDKSA-2007:160) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0731.NASL description Updated tetex packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVice Independent) file as output. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of TeTeX should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25832 published 2007-08-02 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25832 title CentOS 3 / 4 / 5 : tetex (CESA-2007:0731) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0732.NASL description From Red Hat Security Advisory 2007:0732 : Updated poppler packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Poppler is a PDF rendering library, used by applications such as evince. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause an application linked with poppler to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of poppler should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67552 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67552 title Oracle Linux 5 : poppler (ELSA-2007-0732) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200710-08.NASL description The remote host is affected by the vulnerability described in GLSA-200710-08 (KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow) KPDF includes code from xpdf that is vulnerable to an integer overflow in the StreamPredictor::StreamPredictor() function. Impact : A remote attacker could entice a user to open a specially crafted PDF file in KWord or KPDF that would exploit the integer overflow to cause a stack-based buffer overflow in the StreamPredictor::getNextLine() function, possibly resulting in the execution of arbitrary code with the privileges of the user running the application. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 26979 published 2007-10-12 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26979 title GLSA-200710-08 : KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-158.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause xpdf to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25891 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25891 title Mandrake Linux Security Advisory : xpdf (MDKSA-2007:158) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1354.NASL description It was discovered that an integer overflow in xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. gpdf includes a copy of the xpdf code and requires an update as well. last seen 2020-06-01 modified 2020-06-02 plugin id 25887 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25887 title Debian DSA-1354-1 : gpdf - integer overflow NASL family SuSE Local Security Checks NASL id SUSE_KDEGRAPHICS3-PDF-3972.NASL description A buffer overflow in the xpdf code contained in kpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27288 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27288 title openSUSE 10 Security Update : kdegraphics3-pdf (kdegraphics3-pdf-3972) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1347.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. last seen 2020-06-01 modified 2020-06-02 plugin id 25855 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25855 title Debian DSA-1347-1 : xpdf - integer overflow NASL family Scientific Linux Local Security Checks NASL id SL_20070730_KDEGRAPHICS_ON_SL5_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60234 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60234 title Scientific Linux Security Update : kdegraphics on SL5.x, SL4.x i386/x86_64 NASL family Fedora Local Security Checks NASL id FEDORA_2007-1614.NASL description This is an update to address a stack-based buffer overflow vulnerability in kword last seen 2020-06-01 modified 2020-06-02 plugin id 27724 published 2007-11-06 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27724 title Fedora 7 : koffice-1.6.3-9.fc7 (2007-1614) NASL family Fedora Local Security Checks NASL id FEDORA_2007-1594.NASL description This is an update to address a vulnerability in kpdf, one that can cause a stack based buffer overflow. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 27723 published 2007-11-06 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27723 title Fedora 7 : kdegraphics-3.5.7-2.fc7 (2007-1594) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0735.NASL description From Red Hat Security Advisory 2007:0735 : Updated xpdf packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. Xpdf is an X Window System-based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause Xpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of Xpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67553 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67553 title Oracle Linux 3 / 4 : xpdf (ELSA-2007-0735) NASL family SuSE Local Security Checks NASL id SUSE_POPPLER-3991.NASL description A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27399 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27399 title openSUSE 10 Security Update : poppler (poppler-3991) NASL family Fedora Local Security Checks NASL id FEDORA_2007-685.NASL description - Wed Aug 29 2007 Than Ngo <than at redhat.com> - 7:3.5.7-1.fc6.1 - resolves bz#251511, CVE-2007-3387 kpdf integer overflow Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25978 published 2007-09-05 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25978 title Fedora Core 6 : kdegraphics-3.5.7-1.fc6.1 (2007-685) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-496-2.NASL description USN-496-1 fixed a vulnerability in koffice. This update provides the corresponding updates for poppler, the library used for PDF handling in Gnome. Derek Noonburg discovered an integer overflow in the Xpdf function StreamPredictor::StreamPredictor(). By importing a specially crafted PDF file into KWord, this could be exploited to run arbitrary code with the user last seen 2020-06-01 modified 2020-06-02 plugin id 28099 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28099 title Ubuntu 6.06 LTS / 6.10 / 7.04 : poppler vulnerability (USN-496-2) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0731.NASL description Updated tetex packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVice Independent) file as output. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of TeTeX should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25829 published 2007-08-01 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25829 title RHEL 2.1 / 3 / 4 / 5 : tetex (RHSA-2007:0731) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-163.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause koffice to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25895 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25895 title Mandrake Linux Security Advisory : koffice (MDKSA-2007:163) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0730.NASL description From Red Hat Security Advisory 2007:0730 : Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. gpdf is a GNOME based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause gpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of gpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67550 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67550 title Oracle Linux 4 : gpdf (ELSA-2007-0730) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-161.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause poppler to crash and possibly execute arbitrary code open a user opening the file. This update provides packages which are patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25893 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25893 title Mandrake Linux Security Advisory : poppler (MDKSA-2007:161) NASL family Fedora Local Security Checks NASL id FEDORA_2007-1541.NASL description This update fixes a security problem concerning PDF handling. It also fixes printing speed with USB printers, and includes a fix for the LSPP support. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 27720 published 2007-11-06 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27720 title Fedora 7 : cups-1.2.12-4.fc7 (2007-1541) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0720.NASL description From Red Hat Security Advisory 2007:0720 : Updated CUPS packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Maurycy Prodeus discovered an integer overflow flaw in the way CUPS processes PDF files. An attacker could create a malicious PDF file that could potentially execute arbitrary code when printed. (CVE-2007-3387) All users of CUPS should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67544 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67544 title Oracle Linux 3 / 4 / 5 : cups (ELSA-2007-0720) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0730.NASL description Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. gpdf is a GNOME based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause gpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of gpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25817 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25817 title RHEL 4 : gpdf (RHSA-2007:0730) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1350.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. tetex-bin includes a copy of the xpdf code and required an update as well. last seen 2020-06-01 modified 2020-06-02 plugin id 25858 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25858 title Debian DSA-1350-1 : tetex-bin - integer overflow NASL family SuSE Local Security Checks NASL id SUSE_KDEGRAPHICS3-PDF-3968.NASL description A buffer overflow in the xpdf code contained in kpdf could be exploited by attackers to potentially execute arbitrary code. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 29480 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29480 title SuSE 10 Security Update : kdegraphics3-pdf (ZYPP Patch Number 3968) NASL family SuSE Local Security Checks NASL id SUSE_CUPS-4044.NASL description A buffer overflow in the xpdf code contained in cups could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27194 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27194 title openSUSE 10 Security Update : cups (cups-4044) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0732.NASL description Updated poppler packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Poppler is a PDF rendering library, used by applications such as evince. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause an application linked with poppler to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of poppler should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25818 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25818 title RHEL 5 : poppler (RHSA-2007:0732) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0729.NASL description Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment including kpdf, a PDF file viewer. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of kdegraphics should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 37749 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37749 title CentOS 4 / 5 : kdegraphics (CESA-2007:0729) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0732.NASL description Updated poppler packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Poppler is a PDF rendering library, used by applications such as evince. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause an application linked with poppler to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of poppler should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 43649 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43649 title CentOS 5 : poppler (CESA-2007:0732) NASL family Scientific Linux Local Security Checks NASL id SL_20070730_XPDF_ON_SL4_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause Xpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60236 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60236 title Scientific Linux Security Update : xpdf on SL4.x, SL3.x i386/x86_64 NASL family SuSE Local Security Checks NASL id SUSE_PDFTOHTML-3989.NASL description A buffer overflow in the xpdf code contained in pdftohtml could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27384 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27384 title openSUSE 10 Security Update : pdftohtml (pdftohtml-3989) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0729.NASL description Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment including kpdf, a PDF file viewer. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of kdegraphics should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25816 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25816 title RHEL 4 / 5 : kdegraphics (RHSA-2007:0729) NASL family SuSE Local Security Checks NASL id SUSE_XPDF-3969.NASL description A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 29608 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29608 title SuSE 10 Security Update : xpdf (ZYPP Patch Number 3969) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0729.NASL description From Red Hat Security Advisory 2007:0729 : Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment including kpdf, a PDF file viewer. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of kdegraphics should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67549 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67549 title Oracle Linux 4 : kdegraphics (ELSA-2007-0729) NASL family Scientific Linux Local Security Checks NASL id SL_20070730_POPPLER_ON_SL5_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause an application linked with poppler to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60235 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60235 title Scientific Linux Security Update : poppler on SL5.x i386/x86_64 NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_0E43A14D3F3F11DCA79A0016179B2DD5.NASL description The KDE Team reports : kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a vulnerability that can cause a stack based buffer overflow via a PDF file that exploits an integer overflow in StreamPredictor::StreamPredictor(). Remotely supplied pdf files can be used to disrupt the kpdf viewer on the client machine and possibly execute arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 25827 published 2007-08-01 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25827 title FreeBSD : xpdf -- stack based buffer overflow (0e43a14d-3f3f-11dc-a79a-0016179b2dd5) NASL family Fedora Local Security Checks NASL id FEDORA_2008-3449.NASL description - Fri May 9 2008 Tim Waugh <twaugh at redhat.com> 1:1.2.12-11 - Applied patch to fix CVE-2008-1722 (integer overflow in image filter, bug #441692, STR #2790). - Tue Apr 1 2008 Tim Waugh <twaugh at redhat.com> 1:1.2.12-10 - Applied patch to fix CVE-2008-1373 (GIF overflow, bug #438303). - Applied patch to fix CVE-2008-0053 (HP-GL/2 input processing, bug #438117). - Applied patch to prevent heap-based buffer overflow in CUPS helper program (bug #436153, CVE-2008-0047, STR #2729). - Fri Feb 22 2008 Tim Waugh <twaugh at redhat.com> 1:1.2.12-9 - Prevent double-free when a browsed class has the same name as a printer or vice versa (CVE-2008-0882, bug #433758, STR #2656). - Mon Nov 12 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-8 - Fixed CVE-2007-4045 patch; has no effect with shipped packages since they are linked with gnutls. - LSPP fixes (cupsdSetString/ClearString). - Wed Nov 7 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-7 - Applied patch to fix CVE-2007-4045 (bug #250161). - Applied patch to fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5393 (bug #345101). - Thu Nov 1 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-6 - Applied patch to fix CVE-2007-4351 (STR #2561, bug #361661). - Wed Oct 10 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-5 - Use ppdev for parallel port Device ID retrieval (bug #311671). - Thu Aug 9 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-4 - Applied patch to fix CVE-2007-3387 (bug #251518). - Tue Jul 31 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-3 - Better buildroot tag. - Moved LSPP access check and security attributes check in add_job() to before allocation of the job structure (bug #231522). - Mon Jul 23 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-2 - Use kernel support for USB paper-out detection, when available (bug #249213). - Fri Jul 13 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.12-1 - 1.2.12. No longer need adminutil or str2408 patches. - Wed Jul 4 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.11-3 - Better paper-out detection patch still (bug #246222). - Fri Jun 29 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.11-2 - Applied patch to fix group handling in PPDs (bug #186231, STR #2408). - Wed Jun 27 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.11-1 - Fixed permissions on classes.conf in the file manifest (bug #245748). - 1.2.11. - Tue Jun 12 2007 Tim Waugh <twaugh at redhat.com> - Make the initscript use start priority 56 (bug #213828). - Mon Jun 11 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.10-12 - Better paper-out detection patch (bug #241589). - Mon May 21 2007 Tim Waugh <twaugh at redhat.com> 1:1.2.10-11 - Fixed _cupsAdminSetServerSettings() sharing/shared handling (bug #238057). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 32197 published 2008-05-11 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/32197 title Fedora 7 : cups-1.2.12-11.fc7 (2008-3449) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2007-222-02.NASL description A new poppler package is available for Slackware 12.0 to fix an integer overflow. last seen 2020-06-01 modified 2020-06-02 plugin id 25845 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25845 title Slackware 12.0 : poppler (SSA:2007-222-02) NASL family SuSE Local Security Checks NASL id SUSE_LIBEXTRACTOR-4041.NASL description A buffer overflow in the libextractor code contained in kpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27323 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27323 title openSUSE 10 Security Update : libextractor (libextractor-4041) NASL family Scientific Linux Local Security Checks NASL id SL_20070730_GPDF_ON_SL4_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause gpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60233 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60233 title Scientific Linux Security Update : gpdf on SL4.x i386/x86_64 NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1349.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. libextractor includes a copy of the xpdf code and required an update as well. last seen 2020-06-01 modified 2020-06-02 plugin id 25857 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25857 title Debian DSA-1349-1 : libextractor - integer overflow NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1355.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. kpdf includes a copy of the xpdf code and required an update as well. last seen 2020-06-01 modified 2020-06-02 plugin id 25936 published 2007-08-28 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25936 title Debian DSA-1355-1 : kdegraphics - integer overflow NASL family Scientific Linux Local Security Checks NASL id SL_20070801_TETEX_ON_SL5_X.NASL description Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 60238 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60238 title Scientific Linux Security Update : tetex on SL5.x, SL4.x, SL3.x i386/x86_64 NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0730.NASL description Updated kdegraphics packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. gpdf is a GNOME based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause gpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of gpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 36643 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36643 title CentOS 4 : gpdf (CESA-2007:0730) NASL family SuSE Local Security Checks NASL id SUSE_XPDF-3974.NASL description A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-3387). last seen 2020-06-01 modified 2020-06-02 plugin id 27498 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27498 title openSUSE 10 Security Update : xpdf (xpdf-3974) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0735.NASL description Updated xpdf packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. Xpdf is an X Window System-based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause Xpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of Xpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25819 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25819 title RHEL 2.1 / 3 / 4 : xpdf (RHSA-2007:0735) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0735.NASL description Updated xpdf packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. Xpdf is an X Window System-based viewer for Portable Document Format (PDF) files. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause Xpdf to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of Xpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25813 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25813 title CentOS 3 / 4 : xpdf (CESA-2007:0735) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200709-12.NASL description The remote host is affected by the vulnerability described in GLSA-200709-12 (Poppler: Two buffer overflow vulnerabilities) Poppler and Xpdf are vulnerable to an integer overflow in the StreamPredictor::StreamPredictor function, and a stack overflow in the StreamPredictor::getNextLine function. The original vulnerability was discovered by Maurycy Prodeus. Note: Gentoo last seen 2020-06-01 modified 2020-06-02 plugin id 26102 published 2007-09-24 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26102 title GLSA-200709-12 : Poppler: Two buffer overflow vulnerabilities NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0731.NASL description From Red Hat Security Advisory 2007:0731 : Updated tetex packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVice Independent) file as output. Maurycy Prodeus discovered an integer overflow flaw in the processing of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. (CVE-2007-3387) All users of TeTeX should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67551 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67551 title Oracle Linux 3 / 4 / 5 : tetex (ELSA-2007-0731) NASL family SuSE Local Security Checks NASL id SUSE_POPPLER-3992.NASL description A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 29554 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29554 title SuSE 10 Security Update : poppler,poppler-devel (ZYPP Patch Number 3992) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2007-222-05.NASL description New xpdf packages are available for Slackware 9.1, 10.0, 10.1, 10.2, 11.0, and 12.0 to fix an integer overflow. last seen 2020-06-01 modified 2020-06-02 plugin id 25848 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25848 title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 9.1 : xpdf (SSA:2007-222-05) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-164.NASL description Maurycy Prodeus found an integer overflow vulnerability in the way various PDF viewers processed PDF files. An attacker could create a malicious PDF file that could cause tetex to crash and possibly execute arbitrary code open a user opening the file. In addition, tetex contains an embedded copy of the GD library which suffers from a number of bugs which potentially lead to denial of service and possibly other issues. Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified remote attack vectors and impact. (CVE-2007-3472) The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure. (CVE-2007-3473) Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 allow user-assisted remote attackers to have unspecified attack vectors and impact. (CVE-2007-3474) The GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via a GIF image that has no global color map. (CVE-2007-3475) Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault. (CVE-2007-3476) The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allows attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value. (CVE-2007-3477) Race condition in gdImageStringFTEx (gdft_draw_bitmap) in gdft.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving truetype font (TTF) support. (CVE-2007-3478) Updated packages have been patched to prevent these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25896 published 2007-08-15 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25896 title Mandrake Linux Security Advisory : tetex (MDKSA-2007:164) NASL family Fedora Local Security Checks NASL id FEDORA_2007-1547.NASL description - Fri Aug 10 2007 Jindrich Novy <jnovy at redhat.com> 3.0-40.1 - backport upstream fix for xpdf integer overflow CVE-2007-3387 (#251514) - don last seen 2020-06-01 modified 2020-06-02 plugin id 27721 published 2007-11-06 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27721 title Fedora 7 : tetex-3.0-40.1.fc7 (2007-1547) NASL family SuSE Local Security Checks NASL id SUSE_CUPS-4043.NASL description A buffer overflow in the xpdf code contained in cups could be exploited by attackers to potentially execute arbitrary code. (CVE-2007-3387) last seen 2020-06-01 modified 2020-06-02 plugin id 29412 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29412 title SuSE 10 Security Update : cups (ZYPP Patch Number 4043) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1357.NASL description It was discovered that an integer overflow in the xpdf PDF viewer may lead to the execution of arbitrary code if a malformed PDF file is opened. koffice includes a copy of the xpdf code and required an update as well. The oldstable distribution (sarge) will be fixed later. last seen 2020-06-01 modified 2020-06-02 plugin id 25937 published 2007-08-28 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25937 title Debian DSA-1357-1 : koffice - integer overflow NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0720.NASL description Updated CUPS packages that fix a security issue in PDF handling are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Maurycy Prodeus discovered an integer overflow flaw in the way CUPS processes PDF files. An attacker could create a malicious PDF file that could potentially execute arbitrary code when printed. (CVE-2007-3387) All users of CUPS should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25815 published 2007-07-31 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25815 title RHEL 3 / 4 / 5 : cups (RHSA-2007:0720) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2007-316-01.NASL description New xpdf packages are available for Slackware 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, and -current. New poppler packages are available for Slackware 12.0 and -current. New koffice packages are available for Slackware 11.0, 12.0, and -current. New kdegraphics packages are available for Slackware 10.2, 11.0, 12.0, and -current. These updated packages address similar bugs which could be used to crash applications linked with poppler or that use code from xpdf through the use of a malformed PDF document. It is possible that a maliciously crafted document could cause code to be executed in the context of the user running the application processing the PDF. These advisories and CVE entries cover the bugs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393 http://www.kde.org/info/security/advisory-20071107-1.txt last seen 2020-06-01 modified 2020-06-02 plugin id 28149 published 2007-11-12 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28149 title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 9.1 / current : xpdf/poppler/koffice/kdegraphics (SSA:2007-316-01)
Oval
accepted | 2013-04-29T04:11:52.378-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:11149 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://www.redhat.com/support/errata/RHSA-2007-0730.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194
- http://bugs.gentoo.org/show_bug.cgi?id=187139
- http://www.kde.org/info/security/advisory-20070730-1.txt
- ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch
- https://issues.rpath.com/browse/RPL-1596
- https://issues.foresightlinux.org/browse/FL-471
- https://issues.rpath.com/browse/RPL-1604
- http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm
- http://sourceforge.net/project/shownotes.php?release_id=535497
- http://www.debian.org/security/2007/dsa-1347
- http://www.debian.org/security/2007/dsa-1348
- http://www.debian.org/security/2007/dsa-1349
- http://www.debian.org/security/2007/dsa-1350
- http://www.debian.org/security/2007/dsa-1352
- http://www.debian.org/security/2007/dsa-1355
- http://www.debian.org/security/2007/dsa-1354
- http://www.debian.org/security/2007/dsa-1357
- http://security.gentoo.org/glsa/glsa-200709-12.xml
- http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml
- http://security.gentoo.org/glsa/glsa-200710-20.xml
- http://security.gentoo.org/glsa/glsa-200709-17.xml
- http://security.gentoo.org/glsa/glsa-200711-34.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:162
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:158
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:159
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:160
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:161
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:163
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:165
- http://www.redhat.com/support/errata/RHSA-2007-0720.html
- http://www.redhat.com/support/errata/RHSA-2007-0729.html
- http://www.redhat.com/support/errata/RHSA-2007-0732.html
- http://www.redhat.com/support/errata/RHSA-2007-0735.html
- http://www.redhat.com/support/errata/RHSA-2007-0731.html
- ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
- http://www.novell.com/linux/security/advisories/2007_15_sr.html
- http://www.novell.com/linux/security/advisories/2007_16_sr.html
- http://www.ubuntu.com/usn/usn-496-1
- http://www.ubuntu.com/usn/usn-496-2
- http://www.securityfocus.com/bid/25124
- http://www.securitytracker.com/id?1018473
- http://secunia.com/advisories/26188
- http://secunia.com/advisories/26254
- http://secunia.com/advisories/26255
- http://secunia.com/advisories/26257
- http://secunia.com/advisories/26278
- http://secunia.com/advisories/26281
- http://secunia.com/advisories/26283
- http://secunia.com/advisories/26251
- http://secunia.com/advisories/26293
- http://secunia.com/advisories/26292
- http://secunia.com/advisories/26307
- http://secunia.com/advisories/26318
- http://secunia.com/advisories/26342
- http://secunia.com/advisories/26297
- http://secunia.com/advisories/26343
- http://secunia.com/advisories/26358
- http://secunia.com/advisories/26325
- http://secunia.com/advisories/26365
- http://secunia.com/advisories/26370
- http://secunia.com/advisories/26413
- http://secunia.com/advisories/26410
- http://secunia.com/advisories/26403
- http://secunia.com/advisories/26405
- http://secunia.com/advisories/26407
- http://secunia.com/advisories/26432
- http://secunia.com/advisories/26436
- http://secunia.com/advisories/26467
- http://secunia.com/advisories/26468
- http://secunia.com/advisories/26470
- http://secunia.com/advisories/26425
- http://secunia.com/advisories/26395
- http://secunia.com/advisories/26514
- http://secunia.com/advisories/26607
- http://secunia.com/advisories/26862
- http://secunia.com/advisories/27156
- http://secunia.com/advisories/27281
- http://secunia.com/advisories/27308
- http://secunia.com/advisories/27637
- http://secunia.com/advisories/26627
- http://secunia.com/advisories/26982
- http://security.gentoo.org/glsa/glsa-200805-13.xml
- http://secunia.com/advisories/30168
- http://osvdb.org/40127
- http://www.vupen.com/english/advisories/2007/2704
- http://www.vupen.com/english/advisories/2007/2705
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149
- http://www.securityfocus.com/archive/1/476765/30/5340/threaded
- http://www.securityfocus.com/archive/1/476519/30/5400/threaded
- http://www.securityfocus.com/archive/1/476508/100/0/threaded