Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.880859
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for poppler CESA-2009:1504 centos5 i386
Zusammenfassung:The remote host is missing an update for the 'poppler'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'poppler'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Poppler is a Portable Document Format (PDF) rendering library, used by
applications such as Evince.

Multiple integer overflow flaws were found in poppler. An attacker could
create a malicious PDF file that would cause applications that use poppler
(such as Evince) to crash or, potentially, execute arbitrary code when
opened. (CVE-2009-3603, CVE-2009-3608, CVE-2009-3609)

Red Hat would like to thank Chris Rohlf for reporting the CVE-2009-3608
issue.

This update also corrects a regression introduced in the previous poppler
security update, RHSA-2009:0480, that prevented poppler from rendering
certain PDF documents correctly. (BZ#528147)

Users are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.

Affected Software/OS:
poppler on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-3603
1021706
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
1023029
http://securitytracker.com/id?1023029
274030
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
36703
http://www.securityfocus.com/bid/36703
37034
http://secunia.com/advisories/37034
37053
http://secunia.com/advisories/37053
37054
http://secunia.com/advisories/37054
37114
http://secunia.com/advisories/37114
37159
http://secunia.com/advisories/37159
39327
http://secunia.com/advisories/39327
39938
http://secunia.com/advisories/39938
ADV-2009-2924
http://www.vupen.com/english/advisories/2009/2924
ADV-2009-2925
http://www.vupen.com/english/advisories/2009/2925
ADV-2010-0802
http://www.vupen.com/english/advisories/2010/0802
ADV-2010-1040
http://www.vupen.com/english/advisories/2010/1040
ADV-2010-1220
http://www.vupen.com/english/advisories/2010/1220
DSA-2028
http://www.debian.org/security/2010/dsa-2028
DSA-2050
http://www.debian.org/security/2010/dsa-2050
FEDORA-2009-10823
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
FEDORA-2009-10845
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
FEDORA-2010-1377
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
FEDORA-2010-1805
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
FEDORA-2010-1842
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
MDVSA-2009:287
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
MDVSA-2010:087
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
MDVSA-2011:175
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
RHSA-2009:1504
https://rhn.redhat.com/errata/RHSA-2009-1504.html
SUSE-SR:2009:018
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
USN-850-1
http://www.ubuntu.com/usn/USN-850-1
USN-850-3
http://www.ubuntu.com/usn/USN-850-3
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
http://poppler.freedesktop.org/
https://bugzilla.redhat.com/show_bug.cgi?id=526915
oval:org.mitre.oval:def:9671
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9671
xpdf-splashbitmap-bo(53793)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53793
Common Vulnerability Exposure (CVE) ID: CVE-2009-3608
37028
http://secunia.com/advisories/37028
37037
http://secunia.com/advisories/37037
37043
http://secunia.com/advisories/37043
37051
http://secunia.com/advisories/37051
37061
http://secunia.com/advisories/37061
37077
http://secunia.com/advisories/37077
37079
http://secunia.com/advisories/37079
ADV-2009-2926
http://www.vupen.com/english/advisories/2009/2926
ADV-2009-2928
http://www.vupen.com/english/advisories/2009/2928
DSA-1941
http://www.debian.org/security/2009/dsa-1941
MDVSA-2009:334
http://www.mandriva.com/security/advisories?name=MDVSA-2009:334
RHSA-2009:1501
https://rhn.redhat.com/errata/RHSA-2009-1501.html
RHSA-2009:1502
https://rhn.redhat.com/errata/RHSA-2009-1502.html
RHSA-2009:1503
https://rhn.redhat.com/errata/RHSA-2009-1503.html
RHSA-2009:1512
https://rhn.redhat.com/errata/RHSA-2009-1512.html
RHSA-2009:1513
https://rhn.redhat.com/errata/RHSA-2009-1513.html
[oss-security] 20091130 Need more information on recent poppler issues
http://www.openwall.com/lists/oss-security/2009/12/01/1
[oss-security] 20091130 Re: Need more information on recent poppler issues
http://www.openwall.com/lists/oss-security/2009/12/01/5
[oss-security] 20091201 Re: Need more information on recent poppler issues
http://www.openwall.com/lists/oss-security/2009/12/01/6
http://www.ocert.org/advisories/ocert-2009-016.html
https://bugzilla.redhat.com/show_bug.cgi?id=526637
oval:org.mitre.oval:def:9536
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9536
xpdf-objectstream-bo(53794)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53794
Common Vulnerability Exposure (CVE) ID: CVE-2009-3609
37023
http://secunia.com/advisories/37023
RHSA-2009:1500
https://rhn.redhat.com/errata/RHSA-2009-1500.html
RHSA-2010:0755
http://www.redhat.com/support/errata/RHSA-2010-0755.html
https://bugzilla.redhat.com/show_bug.cgi?id=526893
oval:org.mitre.oval:def:11043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11043
oval:org.mitre.oval:def:8134
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8134
xpdf-imagestream-dos(53800)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53800
CopyrightCopyright (C) 2011 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.