Lucene search

K
centosCentOS ProjectCESA-2006:0177
HistoryJan 12, 2006 - 5:08 a.m.

gpdf security update

2006-01-1205:08:16
CentOS Project
lists.centos.org
61

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%

CentOS Errata and Security Advisory CESA-2006:0177

gpdf is a GNOME based viewer for Portable Document Format (PDF) files.

Chris Evans discovered several flaws in the way gpdf processes PDF files.
An attacker could construct a carefully crafted PDF file that could cause
gpdf to crash or possibly execute arbitrary code when opened. The Common
Vulnerabilities and Exposures project assigned the names CVE-2005-3624,
CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues.

Users of gpdf should upgrade to this updated package, which contains a
backported patch to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-January/074727.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074728.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074729.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074735.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074736.html

Affected packages:
gpdf

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0177

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%