rPSA-2007-0013-1 poppler tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi
rPath Update Announcements announce-noreply at rpath.com
Tue Jan 23 03:47:10 EST 2007
Previous message: rPSA-2007-0012-1 ed
Next message: rPSA-2007-0014-1 libgtop
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
--------------------------------------------------------------------------------
rPath Security Advisory: 2007-0013-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Indirect User Deterministic Denial of Service
Updated Versions:
poppler=/conary.rpath.com at rpl:devel//1/0.4.5-1.1-1
tetex=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
tetex-afm=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
tetex-dvips=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
tetex-fonts=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
tetex-latex=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
tetex-xdvi=/conary.rpath.com at rpl:devel//1/2.0.2-28.4-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
https://issues.rpath.com/browse/RPL-964
Description:
Previous versions of the poppler and tetex packages are vulnerable to
an attack in which an intentionally malformed PDF file can create at
least a minor Denial of Service attack on the PDF application, and
may possibly allow for directed or arbitrary code execution.
Search for in Google by Dino
jueves, 25 de enero de 2007
poppler (denial of service, code execution)
Publicado por http://hackinganddefense.blogspot.com/ Etiquetas: SEGURIDAD INFORMATICA en 9:33 p.m.
Suscribirse a:
Comentarios de la entrada (Atom)
No hay comentarios.:
Publicar un comentario