Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56485
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2006:032 (xpdf)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to xpdf
announced via advisory MDKSA-2006:032.

Heap-based buffer overflow in Splash.cc in xpdf allows attackers to
cause a denial of service and possibly execute arbitrary code via
crafted splash images that produce certain values that exceed the width
or height of the associated bitmap.

The updated packages have been patched to correct this issue.

Affected: 2006.0, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:032

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-0301
1015576
http://securitytracker.com/id?1015576
18274
http://secunia.com/advisories/18274
18677
http://secunia.com/advisories/18677
18707
http://secunia.com/advisories/18707
18825
http://secunia.com/advisories/18825
18826
http://secunia.com/advisories/18826
18834
http://secunia.com/advisories/18834
18837
http://secunia.com/advisories/18837
18838
http://secunia.com/advisories/18838
18839
http://secunia.com/advisories/18839
18860
http://secunia.com/advisories/18860
18862
http://secunia.com/advisories/18862
18864
http://secunia.com/advisories/18864
18875
http://secunia.com/advisories/18875
18882
http://secunia.com/advisories/18882
18908
http://secunia.com/advisories/18908
18913
http://secunia.com/advisories/18913
18983
http://secunia.com/advisories/18983
19377
http://secunia.com/advisories/19377
20060202 [KDE Security Advisory] kpdf/xpdf heap based buffer overflow
http://www.securityfocus.com/archive/1/423899/100/0/threaded
470
http://securityreason.com/securityalert/470
ADV-2006-0389
http://www.vupen.com/english/advisories/2006/0389
ADV-2006-0422
http://www.vupen.com/english/advisories/2006/0422
DSA-971
http://www.debian.org/security/2006/dsa-971
DSA-972
http://www.debian.org/security/2006/dsa-972
DSA-974
http://www.debian.org/security/2006/dsa-974
FEDORA-2006-103
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html
FLSA:175404
http://www.securityfocus.com/archive/1/427990/100/0/threaded
GLSA-200602-04
http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml
GLSA-200602-05
http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml
GLSA-200602-12
http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml
MDKSA-2006:030
http://www.mandriva.com/security/advisories?name=MDKSA-2006:030
MDKSA-2006:031
http://www.mandriva.com/security/advisories?name=MDKSA-2006:031
MDKSA-2006:032
http://www.mandriva.com/security/advisories?name=MDKSA-2006:032
RHSA-2006:0201
http://www.redhat.com/support/errata/RHSA-2006-0201.html
RHSA-2006:0206
http://rhn.redhat.com/errata/RHSA-2006-0206.html
SCOSA-2006.15
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
SSA:2006-045-04
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
SSA:2006-045-09
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
USN-249-1
http://www.ubuntu.com/usn/usn-249-1
http://www.kde.org/info/security/advisory-20060202-1.txt
https://bugzilla.novell.com/show_bug.cgi?id=141242
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
oval:org.mitre.oval:def:10850
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850
xpdf-splash-bo(24391)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24391
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.