ID OPENVAS:1361412562310830028
Type openvas
Reporter Copyright (C) 2009 Greenbone Networks GmbH
Modified 2018-04-06T00:00:00
Description
Check for the Version of koffice
###############################################################################
# OpenVAS Vulnerability Test
#
# Mandriva Update for koffice MDKSA-2007:018 (koffice)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,
kpdf in KDE before 3.5.5, and other products, allows remote attackers
to have an unknown impact, possibly including denial of service
(infinite loop), arbitrary code execution, or memory corruption, via a
PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages
attribute that references an invalid page tree node.
The updated packages have been patched to correct this problem.";
tag_affected = "koffice on Mandriva Linux 2007.0,
Mandriva Linux 2007.0/X86_64";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "http://lists.mandriva.com/security-announce/2007-01/msg00028.php");
script_oid("1.3.6.1.4.1.25623.1.0.830028");
script_version("$Revision: 9370 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_xref(name: "MDKSA", value: "2007:018");
script_cve_id("CVE-2007-0104");
script_name( "Mandriva Update for koffice MDKSA-2007:018 (koffice)");
script_tag(name:"summary", value:"Check for the Version of koffice");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("Mandrake Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mandriva_mandrake_linux", "ssh/login/release");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "MNDK_2007.0")
{
if ((res = isrpmvuln(pkg:"koffice", rpm:"koffice~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-karbon", rpm:"koffice-karbon~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kexi", rpm:"koffice-kexi~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kformula", rpm:"koffice-kformula~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kivio", rpm:"koffice-kivio~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-koshell", rpm:"koffice-koshell~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kplato", rpm:"koffice-kplato~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kpresenter", rpm:"koffice-kpresenter~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-krita", rpm:"koffice-krita~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kspread", rpm:"koffice-kspread~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kugar", rpm:"koffice-kugar~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-kword", rpm:"koffice-kword~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"koffice-progs", rpm:"koffice-progs~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-karbon", rpm:"libkoffice2-karbon~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-karbon-devel", rpm:"libkoffice2-karbon-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kexi", rpm:"libkoffice2-kexi~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kexi-devel", rpm:"libkoffice2-kexi-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kformula", rpm:"libkoffice2-kformula~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kformula-devel", rpm:"libkoffice2-kformula-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kivio", rpm:"libkoffice2-kivio~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kivio-devel", rpm:"libkoffice2-kivio-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-koshell", rpm:"libkoffice2-koshell~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kplato", rpm:"libkoffice2-kplato~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kpresenter", rpm:"libkoffice2-kpresenter~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kpresenter-devel", rpm:"libkoffice2-kpresenter-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-krita", rpm:"libkoffice2-krita~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-krita-devel", rpm:"libkoffice2-krita-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kspread", rpm:"libkoffice2-kspread~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kspread-devel", rpm:"libkoffice2-kspread-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kugar", rpm:"libkoffice2-kugar~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kugar-devel", rpm:"libkoffice2-kugar-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kword", rpm:"libkoffice2-kword~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-kword-devel", rpm:"libkoffice2-kword-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-progs", rpm:"libkoffice2-progs~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libkoffice2-progs-devel", rpm:"libkoffice2-progs-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-karbon", rpm:"lib64koffice2-karbon~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-karbon-devel", rpm:"lib64koffice2-karbon-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kexi", rpm:"lib64koffice2-kexi~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kexi-devel", rpm:"lib64koffice2-kexi-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kformula", rpm:"lib64koffice2-kformula~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kformula-devel", rpm:"lib64koffice2-kformula-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kivio", rpm:"lib64koffice2-kivio~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kivio-devel", rpm:"lib64koffice2-kivio-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-koshell", rpm:"lib64koffice2-koshell~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kplato", rpm:"lib64koffice2-kplato~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kpresenter", rpm:"lib64koffice2-kpresenter~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kpresenter-devel", rpm:"lib64koffice2-kpresenter-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-krita", rpm:"lib64koffice2-krita~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-krita-devel", rpm:"lib64koffice2-krita-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kspread", rpm:"lib64koffice2-kspread~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kspread-devel", rpm:"lib64koffice2-kspread-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kugar", rpm:"lib64koffice2-kugar~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kugar-devel", rpm:"lib64koffice2-kugar-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kword", rpm:"lib64koffice2-kword~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-kword-devel", rpm:"lib64koffice2-kword-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-progs", rpm:"lib64koffice2-progs~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64koffice2-progs-devel", rpm:"lib64koffice2-progs-devel~1.5.91~3.3mdv2007.0", rls:"MNDK_2007.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:1361412562310830028", "type": "openvas", "bulletinFamily": "scanner", "title": "Mandriva Update for koffice MDKSA-2007:018 (koffice)", "description": "Check for the Version of koffice", "published": "2009-04-09T00:00:00", "modified": "2018-04-06T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830028", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["2007:018", "http://lists.mandriva.com/security-announce/2007-01/msg00028.php"], "cvelist": ["CVE-2007-0104"], "lastseen": "2018-04-09T11:40:22", "viewCount": 0, "enchantments": {"score": {"value": 7.0, "vector": "NONE", "modified": "2018-04-09T11:40:22", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-0104"]}, {"type": "ubuntu", "idList": ["USN-410-2", "USN-410-1"]}, {"type": "openvas", "idList": ["OPENVAS:830131", "OPENVAS:1361412562310830158", "OPENVAS:830004", "OPENVAS:1361412562310830054", "OPENVAS:840167", "OPENVAS:1361412562310830131", "OPENVAS:840035", "OPENVAS:830158", "OPENVAS:1361412562310830090", "OPENVAS:65184"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:15757", "SECURITYVULNS:DOC:15756", "SECURITYVULNS:DOC:15758", "SECURITYVULNS:VULN:7067", "SECURITYVULNS:DOC:15749"]}, {"type": "nessus", "idList": ["SUSE_POPPLER-2590.NASL", "SUSE_GPDF-2596.NASL", "MANDRAKE_MDKSA-2007-021.NASL", "SUSE_KDEGRAPHICS3-PDF-2565.NASL", "SUSE_KOFFICE-WORDPROCESSING-2577.NASL", "SUSE_XPDF-2473.NASL", "SUSE_XPDF-TOOLS-2472.NASL", "SUSE_POPPLER-2589.NASL", "SUSE_PDFTOHTML-2475.NASL", "SUSE_KOFFICE-WORDPROCESSING-2648.NASL"]}, {"type": "osvdb", "idList": ["OSVDB:32870", "OSVDB:32871"]}, {"type": "seebug", "idList": ["SSV:2900"]}], "modified": "2018-04-09T11:40:22", "rev": 2}, "vulnersScore": 7.0}, "pluginID": "1361412562310830028", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for koffice MDKSA-2007:018 (koffice)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"koffice on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00028.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830028\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:018\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for koffice MDKSA-2007:018 (koffice)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of koffice\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"koffice\", rpm:\"koffice~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-karbon\", rpm:\"koffice-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kexi\", rpm:\"koffice-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kformula\", rpm:\"koffice-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kivio\", rpm:\"koffice-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-koshell\", rpm:\"koffice-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kplato\", rpm:\"koffice-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kpresenter\", rpm:\"koffice-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-krita\", rpm:\"koffice-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kspread\", rpm:\"koffice-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kugar\", rpm:\"koffice-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kword\", rpm:\"koffice-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-progs\", rpm:\"koffice-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-karbon\", rpm:\"libkoffice2-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-karbon-devel\", rpm:\"libkoffice2-karbon-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kexi\", rpm:\"libkoffice2-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kexi-devel\", rpm:\"libkoffice2-kexi-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kformula\", rpm:\"libkoffice2-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kformula-devel\", rpm:\"libkoffice2-kformula-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kivio\", rpm:\"libkoffice2-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kivio-devel\", rpm:\"libkoffice2-kivio-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-koshell\", rpm:\"libkoffice2-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kplato\", rpm:\"libkoffice2-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kpresenter\", rpm:\"libkoffice2-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kpresenter-devel\", rpm:\"libkoffice2-kpresenter-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-krita\", rpm:\"libkoffice2-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-krita-devel\", rpm:\"libkoffice2-krita-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kspread\", rpm:\"libkoffice2-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kspread-devel\", rpm:\"libkoffice2-kspread-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kugar\", rpm:\"libkoffice2-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kugar-devel\", rpm:\"libkoffice2-kugar-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kword\", rpm:\"libkoffice2-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kword-devel\", rpm:\"libkoffice2-kword-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-progs\", rpm:\"libkoffice2-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-progs-devel\", rpm:\"libkoffice2-progs-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-karbon\", rpm:\"lib64koffice2-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-karbon-devel\", rpm:\"lib64koffice2-karbon-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kexi\", rpm:\"lib64koffice2-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kexi-devel\", rpm:\"lib64koffice2-kexi-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kformula\", rpm:\"lib64koffice2-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kformula-devel\", rpm:\"lib64koffice2-kformula-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kivio\", rpm:\"lib64koffice2-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kivio-devel\", rpm:\"lib64koffice2-kivio-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-koshell\", rpm:\"lib64koffice2-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kplato\", rpm:\"lib64koffice2-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kpresenter\", rpm:\"lib64koffice2-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kpresenter-devel\", rpm:\"lib64koffice2-kpresenter-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-krita\", rpm:\"lib64koffice2-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-krita-devel\", rpm:\"lib64koffice2-krita-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kspread\", rpm:\"lib64koffice2-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kspread-devel\", rpm:\"lib64koffice2-kspread-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kugar\", rpm:\"lib64koffice2-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kugar-devel\", rpm:\"lib64koffice2-kugar-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kword\", rpm:\"lib64koffice2-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kword-devel\", rpm:\"lib64koffice2-kword-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-progs\", rpm:\"lib64koffice2-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-progs-devel\", rpm:\"lib64koffice2-progs-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Mandrake Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T05:31:20", "description": "The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.", "edition": 4, "cvss3": {}, "published": "2007-01-09T00:28:00", "title": "CVE-2007-0104", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0104"], "modified": "2018-10-16T16:31:00", "cpe": ["cpe:/o:kde:kde:3.2.2", "cpe:/o:kde:kde:3.3.2", "cpe:/o:kde:kde:3.3", "cpe:/a:xpdf:xpdf:3.0_pl2", "cpe:/o:kde:kde:3.2", "cpe:/a:xpdf:xpdf:3.0", "cpe:/o:kde:kde:3.5", "cpe:/a:xpdf:xpdf:3.0.1", "cpe:/o:kde:kde:3.4.3", "cpe:/a:xpdf:xpdf:3.0.1_pl1", "cpe:/o:kde:kde:3.3.1", "cpe:/a:xpdf:xpdf:3.0.1_pl2", "cpe:/o:kde:kde:3.4.1", "cpe:/o:kde:kde:3.2.3", "cpe:/o:kde:kde:3.4", "cpe:/o:kde:kde:3.2.1", "cpe:/o:kde:kde:3.4.2"], "id": "CVE-2007-0104", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0104", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-09T01:39:07", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0104"], "description": "The poppler PDF loader library did not limit the recursion depth of \nthe page model tree. By tricking a user into opening a specially \ncrafter PDF file, this could be exploited to trigger an infinite loop \nand eventually crash an application that uses this library.\n\nkpdf in Ubuntu 5.10, and KOffice in all Ubuntu releases contains a \ncopy of this code and thus is affected as well.", "edition": 6, "modified": "2007-01-19T00:00:00", "published": "2007-01-19T00:00:00", "id": "USN-410-1", "href": "https://ubuntu.com/security/notices/USN-410-1", "title": "poppler vulnerability", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-09T01:37:08", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0104"], "description": "USN-410-1 fixed vulnerabilities in the poppler PDF loader library. This \nupdate provides the corresponding updates for a copy of this code in \ntetex-bin in Ubuntu 5.10. Versions of tetex-bin after Ubuntu 5.10 use \npoppler directly and do not need a separate update.\n\nOriginal advisory details:\n\nThe poppler PDF loader library did not limit the recursion depth of \nthe page model tree. By tricking a user into opening a specially \ncrafter PDF file, this could be exploited to trigger an infinite loop \nand eventually crash an application that uses this library.", "edition": 6, "modified": "2007-01-26T00:00:00", "published": "2007-01-26T00:00:00", "id": "USN-410-2", "href": "https://ubuntu.com/security/notices/USN-410-2", "title": "teTeX vulnerability", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-24T12:56:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of poppler", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830131", "href": "http://plugins.openvas.org/nasl.php?oid=830131", "type": "openvas", "title": "Mandriva Update for poppler MDKSA-2007:020 (poppler)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for poppler MDKSA-2007:020 (poppler)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"poppler on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00030.php\");\n script_id(830131);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:020\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for poppler MDKSA-2007:020 (poppler)\");\n\n script_summary(\"Check for the Version of poppler\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt1\", rpm:\"libpoppler-qt1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt1-devel\", rpm:\"libpoppler-qt1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt4-1\", rpm:\"libpoppler-qt4-1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt4-1-devel\", rpm:\"libpoppler-qt4-1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler1\", rpm:\"libpoppler1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler1-devel\", rpm:\"libpoppler1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"poppler\", rpm:\"poppler~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt1\", rpm:\"lib64poppler-qt1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt1-devel\", rpm:\"lib64poppler-qt1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt4-1\", rpm:\"lib64poppler-qt4-1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt4-1-devel\", rpm:\"lib64poppler-qt4-1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler1\", rpm:\"lib64poppler1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler1-devel\", rpm:\"lib64poppler1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:39:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of poppler", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830131", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830131", "type": "openvas", "title": "Mandriva Update for poppler MDKSA-2007:020 (poppler)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for poppler MDKSA-2007:020 (poppler)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"poppler on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00030.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830131\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:020\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for poppler MDKSA-2007:020 (poppler)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of poppler\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt1\", rpm:\"libpoppler-qt1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt1-devel\", rpm:\"libpoppler-qt1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt4-1\", rpm:\"libpoppler-qt4-1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler-qt4-1-devel\", rpm:\"libpoppler-qt4-1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler1\", rpm:\"libpoppler1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpoppler1-devel\", rpm:\"libpoppler1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"poppler\", rpm:\"poppler~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt1\", rpm:\"lib64poppler-qt1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt1-devel\", rpm:\"lib64poppler-qt1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt4-1\", rpm:\"lib64poppler-qt4-1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler-qt4-1-devel\", rpm:\"lib64poppler-qt4-1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler1\", rpm:\"lib64poppler1~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64poppler1-devel\", rpm:\"lib64poppler1-devel~0.5.3~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:40:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of tetex", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830054", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830054", "type": "openvas", "title": "Mandriva Update for tetex MDKSA-2007:022 (tetex)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for tetex MDKSA-2007:022 (tetex)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"tetex on Mandriva Linux 2006.0,\n Mandriva Linux 2006.0/X86_64,\n Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00032.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830054\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:022\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for tetex MDKSA-2007:022 (tetex)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of tetex\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"jadetex\", rpm:\"jadetex~3.12~116.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex\", rpm:\"tetex~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-afm\", rpm:\"tetex-afm~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-context\", rpm:\"tetex-context~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-devel\", rpm:\"tetex-devel~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-doc\", rpm:\"tetex-doc~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvilj\", rpm:\"tetex-dvilj~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvipdfm\", rpm:\"tetex-dvipdfm~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvips\", rpm:\"tetex-dvips~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-latex\", rpm:\"tetex-latex~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-mfwin\", rpm:\"tetex-mfwin~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-texi2html\", rpm:\"tetex-texi2html~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-xdvi\", rpm:\"tetex-xdvi~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xmltex\", rpm:\"xmltex~1.9~64.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2006.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"jadetex\", rpm:\"jadetex~3.12~110.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex\", rpm:\"tetex~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-afm\", rpm:\"tetex-afm~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-context\", rpm:\"tetex-context~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-devel\", rpm:\"tetex-devel~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-doc\", rpm:\"tetex-doc~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvilj\", rpm:\"tetex-dvilj~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvipdfm\", rpm:\"tetex-dvipdfm~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvips\", rpm:\"tetex-dvips~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-latex\", rpm:\"tetex-latex~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-mfwin\", rpm:\"tetex-mfwin~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-texi2html\", rpm:\"tetex-texi2html~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-xdvi\", rpm:\"tetex-xdvi~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xmltex\", rpm:\"xmltex~1.9~58.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of pdftohtml", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830004", "href": "http://plugins.openvas.org/nasl.php?oid=830004", "type": "openvas", "title": "Mandriva Update for pdftohtml MDKSA-2007:019 (pdftohtml)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for pdftohtml MDKSA-2007:019 (pdftohtml)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"pdftohtml on Mandriva Linux 2006.0,\n Mandriva Linux 2006.0/X86_64,\n Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00029.php\");\n script_id(830004);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:019\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for pdftohtml MDKSA-2007:019 (pdftohtml)\");\n\n script_summary(\"Check for the Version of pdftohtml\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"pdftohtml\", rpm:\"pdftohtml~0.36~5.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2006.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"pdftohtml\", rpm:\"pdftohtml~0.36~2.2.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:27:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-410-1", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "id": "OPENVAS:840167", "href": "http://plugins.openvas.org/nasl.php?oid=840167", "type": "openvas", "title": "Ubuntu Update for kdegraphics, koffice, poppler vulnerability USN-410-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_410_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for kdegraphics, koffice, poppler vulnerability USN-410-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The poppler PDF loader library did not limit the recursion depth of\n the page model tree. By tricking a user into opening a specially\n crafter PDF file, this could be exploited to trigger an infinite loop\n and eventually crash an application that uses this library.\n\n kpdf in Ubuntu 5.10, and KOffice in all Ubuntu releases contains a\n copy of this code and thus is affected as well.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-410-1\";\ntag_affected = \"kdegraphics, koffice, poppler vulnerability on Ubuntu 5.10 ,\n Ubuntu 6.06 LTS ,\n Ubuntu 6.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-410-1/\");\n script_id(840167);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"410-1\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Ubuntu Update for kdegraphics, koffice, poppler vulnerability USN-410-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"karbon\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kchart\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kexi\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kformula\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-dbg\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-dev\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-libs\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koshell\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kplato\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpresenter\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krita\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kspread\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kthesaurus\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kugar\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kword\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-dev\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-glib-dev\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-qt-dev\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1-glib\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1-qt\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"poppler-utils\", ver:\"0.5.1-0ubuntu7.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio-data\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-data\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-doc-html\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-doc\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpresenter-data\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krita-data\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kword-data\", ver:\"1.5.0-0ubuntu9.1\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"karbon\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kchart\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kexi\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kformula\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-dbg\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-dev\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-libs\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koshell\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kplato\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpresenter\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krita\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kspread\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kthesaurus\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kugar\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kword\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-dev\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-glib-dev\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-qt-dev\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-qt4-dev\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1-glib\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1-qt4\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1-qt\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler1\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"poppler-utils\", ver:\"0.5.4-0ubuntu4.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio-data\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-data\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-doc-html\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-doc\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpresenter-data\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krita-data\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kword-data\", ver:\"1.5.2-0ubuntu2.1\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU5.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"kamera\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"karbon\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kchart\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kcoloredit\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kdegraphics-dev\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kdegraphics-kfile-plugins\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kdvi\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kfax\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kformula\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kgamma\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kghostview\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kiconedit\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kmrml\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-dev\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-libs\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kolourpaint\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kooka\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koshell\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpdf\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpovmodeler\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kpresenter\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krita\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kruler\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ksnapshot\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kspread\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ksvg\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kthesaurus\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kugar\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kuickshow\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kview\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kviewshell\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kword\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkscan-dev\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkscan1\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-dev\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-glib-dev\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler-qt-dev\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler0c2-glib\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler0c2-qt\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpoppler0c2\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"poppler-utils\", ver:\"0.4.2-0ubuntu6.8\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kdegraphics-doc-html\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kdegraphics\", ver:\"3.4.3-0ubuntu2.6\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kivio-data\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-data\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice-doc-html\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"koffice\", ver:\"1.4.1-0ubuntu7.5\", rls:\"UBUNTU5.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:40:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of xpdf", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830090", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830090", "type": "openvas", "title": "Mandriva Update for xpdf MDKSA-2007:021 (xpdf)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for xpdf MDKSA-2007:021 (xpdf)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"xpdf on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00031.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830090\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:021\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for xpdf MDKSA-2007:021 (xpdf)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of xpdf\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"xpdf\", rpm:\"xpdf~3.01pl2~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xpdf-tools\", rpm:\"xpdf-tools~3.01pl2~3.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n cups-devel\n cups-client\n cups-libs\n cups\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5011363 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065184", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065184", "type": "openvas", "title": "SLES9: Security update for cups", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5011363.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for cups\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n cups-devel\n cups-client\n cups-libs\n cups\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5011363 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65184\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-0104\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for cups\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"cups-devel\", rpm:\"cups-devel~1.1.20~108.35\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of kdegraphics", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830158", "href": "http://plugins.openvas.org/nasl.php?oid=830158", "type": "openvas", "title": "Mandriva Update for kdegraphics MDKSA-2007:024 (kdegraphics)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for kdegraphics MDKSA-2007:024 (kdegraphics)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"kdegraphics on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00036.php\");\n script_id(830158);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:024\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for kdegraphics MDKSA-2007:024 (kdegraphics)\");\n\n script_summary(\"Check for the Version of kdegraphics\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdegraphics\", rpm:\"kdegraphics~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-common\", rpm:\"kdegraphics-common~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kcolorchooser\", rpm:\"kdegraphics-kcolorchooser~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kcoloredit\", rpm:\"kdegraphics-kcoloredit~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kdvi\", rpm:\"kdegraphics-kdvi~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kfax\", rpm:\"kdegraphics-kfax~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kghostview\", rpm:\"kdegraphics-kghostview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kiconedit\", rpm:\"kdegraphics-kiconedit~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kolourpaint\", rpm:\"kdegraphics-kolourpaint~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kooka\", rpm:\"kdegraphics-kooka~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kpdf\", rpm:\"kdegraphics-kpdf~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kpovmodeler\", rpm:\"kdegraphics-kpovmodeler~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kruler\", rpm:\"kdegraphics-kruler~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-ksnapshot\", rpm:\"kdegraphics-ksnapshot~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-ksvg\", rpm:\"kdegraphics-ksvg~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kuickshow\", rpm:\"kdegraphics-kuickshow~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-kview\", rpm:\"kdegraphics-kview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-mrmlsearch\", rpm:\"kdegraphics-mrmlsearch~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-common\", rpm:\"libkdegraphics0-common~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-common-devel\", rpm:\"libkdegraphics0-common-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kghostview\", rpm:\"libkdegraphics0-kghostview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kghostview-devel\", rpm:\"libkdegraphics0-kghostview-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kooka\", rpm:\"libkdegraphics0-kooka~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kooka-devel\", rpm:\"libkdegraphics0-kooka-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kpovmodeler\", rpm:\"libkdegraphics0-kpovmodeler~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kpovmodeler-devel\", rpm:\"libkdegraphics0-kpovmodeler-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-ksvg\", rpm:\"libkdegraphics0-ksvg~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-ksvg-devel\", rpm:\"libkdegraphics0-ksvg-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kview\", rpm:\"libkdegraphics0-kview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdegraphics0-kview-devel\", rpm:\"libkdegraphics0-kview-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-common\", rpm:\"lib64kdegraphics0-common~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-common-devel\", rpm:\"lib64kdegraphics0-common-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kghostview\", rpm:\"lib64kdegraphics0-kghostview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kghostview-devel\", rpm:\"lib64kdegraphics0-kghostview-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kooka\", rpm:\"lib64kdegraphics0-kooka~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kooka-devel\", rpm:\"lib64kdegraphics0-kooka-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kpovmodeler\", rpm:\"lib64kdegraphics0-kpovmodeler~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kpovmodeler-devel\", rpm:\"lib64kdegraphics0-kpovmodeler-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-ksvg\", rpm:\"lib64kdegraphics0-ksvg~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-ksvg-devel\", rpm:\"lib64kdegraphics0-ksvg-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kview\", rpm:\"lib64kdegraphics0-kview~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdegraphics0-kview-devel\", rpm:\"lib64kdegraphics0-kview-devel~3.5.4~7.2mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of koffice", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830028", "href": "http://plugins.openvas.org/nasl.php?oid=830028", "type": "openvas", "title": "Mandriva Update for koffice MDKSA-2007:018 (koffice)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for koffice MDKSA-2007:018 (koffice)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"koffice on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00028.php\");\n script_id(830028);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:018\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for koffice MDKSA-2007:018 (koffice)\");\n\n script_summary(\"Check for the Version of koffice\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"koffice\", rpm:\"koffice~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-karbon\", rpm:\"koffice-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kexi\", rpm:\"koffice-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kformula\", rpm:\"koffice-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kivio\", rpm:\"koffice-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-koshell\", rpm:\"koffice-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kplato\", rpm:\"koffice-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kpresenter\", rpm:\"koffice-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-krita\", rpm:\"koffice-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kspread\", rpm:\"koffice-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kugar\", rpm:\"koffice-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-kword\", rpm:\"koffice-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"koffice-progs\", rpm:\"koffice-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-karbon\", rpm:\"libkoffice2-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-karbon-devel\", rpm:\"libkoffice2-karbon-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kexi\", rpm:\"libkoffice2-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kexi-devel\", rpm:\"libkoffice2-kexi-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kformula\", rpm:\"libkoffice2-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kformula-devel\", rpm:\"libkoffice2-kformula-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kivio\", rpm:\"libkoffice2-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kivio-devel\", rpm:\"libkoffice2-kivio-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-koshell\", rpm:\"libkoffice2-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kplato\", rpm:\"libkoffice2-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kpresenter\", rpm:\"libkoffice2-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kpresenter-devel\", rpm:\"libkoffice2-kpresenter-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-krita\", rpm:\"libkoffice2-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-krita-devel\", rpm:\"libkoffice2-krita-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kspread\", rpm:\"libkoffice2-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kspread-devel\", rpm:\"libkoffice2-kspread-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kugar\", rpm:\"libkoffice2-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kugar-devel\", rpm:\"libkoffice2-kugar-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kword\", rpm:\"libkoffice2-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-kword-devel\", rpm:\"libkoffice2-kword-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-progs\", rpm:\"libkoffice2-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkoffice2-progs-devel\", rpm:\"libkoffice2-progs-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-karbon\", rpm:\"lib64koffice2-karbon~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-karbon-devel\", rpm:\"lib64koffice2-karbon-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kexi\", rpm:\"lib64koffice2-kexi~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kexi-devel\", rpm:\"lib64koffice2-kexi-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kformula\", rpm:\"lib64koffice2-kformula~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kformula-devel\", rpm:\"lib64koffice2-kformula-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kivio\", rpm:\"lib64koffice2-kivio~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kivio-devel\", rpm:\"lib64koffice2-kivio-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-koshell\", rpm:\"lib64koffice2-koshell~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kplato\", rpm:\"lib64koffice2-kplato~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kpresenter\", rpm:\"lib64koffice2-kpresenter~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kpresenter-devel\", rpm:\"lib64koffice2-kpresenter-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-krita\", rpm:\"lib64koffice2-krita~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-krita-devel\", rpm:\"lib64koffice2-krita-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kspread\", rpm:\"lib64koffice2-kspread~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kspread-devel\", rpm:\"lib64koffice2-kspread-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kugar\", rpm:\"lib64koffice2-kugar~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kugar-devel\", rpm:\"lib64koffice2-kugar-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kword\", rpm:\"lib64koffice2-kword~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-kword-devel\", rpm:\"lib64koffice2-kword-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-progs\", rpm:\"lib64koffice2-progs~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64koffice2-progs-devel\", rpm:\"lib64koffice2-progs-devel~1.5.91~3.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "description": "Check for the Version of tetex", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830054", "href": "http://plugins.openvas.org/nasl.php?oid=830054", "type": "openvas", "title": "Mandriva Update for tetex MDKSA-2007:022 (tetex)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for tetex MDKSA-2007:022 (tetex)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\n to have an unknown impact, possibly including denial of service\n (infinite loop), arbitrary code execution, or memory corruption, via a\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\n attribute that references an invalid page tree node.\n\n The updated packages have been patched to correct this problem.\";\n\ntag_affected = \"tetex on Mandriva Linux 2006.0,\n Mandriva Linux 2006.0/X86_64,\n Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-01/msg00032.php\");\n script_id(830054);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:022\");\n script_cve_id(\"CVE-2007-0104\");\n script_name( \"Mandriva Update for tetex MDKSA-2007:022 (tetex)\");\n\n script_summary(\"Check for the Version of tetex\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"jadetex\", rpm:\"jadetex~3.12~116.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex\", rpm:\"tetex~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-afm\", rpm:\"tetex-afm~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-context\", rpm:\"tetex-context~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-devel\", rpm:\"tetex-devel~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-doc\", rpm:\"tetex-doc~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvilj\", rpm:\"tetex-dvilj~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvipdfm\", rpm:\"tetex-dvipdfm~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvips\", rpm:\"tetex-dvips~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-latex\", rpm:\"tetex-latex~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-mfwin\", rpm:\"tetex-mfwin~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-texi2html\", rpm:\"tetex-texi2html~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-xdvi\", rpm:\"tetex-xdvi~3.0~18.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xmltex\", rpm:\"xmltex~1.9~64.1mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2006.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"jadetex\", rpm:\"jadetex~3.12~110.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex\", rpm:\"tetex~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-afm\", rpm:\"tetex-afm~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-context\", rpm:\"tetex-context~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-devel\", rpm:\"tetex-devel~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-doc\", rpm:\"tetex-doc~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvilj\", rpm:\"tetex-dvilj~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvipdfm\", rpm:\"tetex-dvipdfm~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-dvips\", rpm:\"tetex-dvips~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-latex\", rpm:\"tetex-latex~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-mfwin\", rpm:\"tetex-mfwin~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-texi2html\", rpm:\"tetex-texi2html~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"tetex-xdvi\", rpm:\"tetex-xdvi~3.0~12.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xmltex\", rpm:\"xmltex~1.9~58.3.20060mdk\", rls:\"MNDK_2006.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:20", "bulletinFamily": "software", "cvelist": ["CVE-2007-0104"], "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2007:019\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : pdftohtml\r\n Date : January 18, 2007\r\n Affected: 2006.0, 2007.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\r\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\r\n to have an unknown impact, possibly including denial of service\r\n (infinite loop), arbitrary code execution, or memory corruption, via a\r\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\r\n attribute that references an invalid page tree node.\r\n\r\n The updated packages have been patched to correct this problem.\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2006.0:\r\n 8c5528f9018b261887538d3dac6ce8bb 2006.0/i586/pdftohtml-0.36-2.2.20060mdk.i586.rpm \r\n 45b30c0ca9d4179097948e37e5cccb85 2006.0/SRPMS/pdftohtml-0.36-2.2.20060mdk.src.rpm\r\n\r\n Mandriva Linux 2006.0/X86_64:\r\n 784d32b1f0106db8b9ec1e5ad2bf3f7f 2006.0/x86_64/pdftohtml-0.36-2.2.20060mdk.x86_64.rpm \r\n 45b30c0ca9d4179097948e37e5cccb85 2006.0/SRPMS/pdftohtml-0.36-2.2.20060mdk.src.rpm\r\n\r\n Mandriva Linux 2007.0:\r\n e76274c7e22d68f38a9e1ae97494f71f 2007.0/i586/pdftohtml-0.36-5.1mdv2007.0.i586.rpm \r\n d52fb3abbff1579eb3ca70aacac01273 2007.0/SRPMS/pdftohtml-0.36-5.1mdv2007.0.src.rpm\r\n\r\n Mandriva Linux 2007.0/X86_64:\r\n 06be394049978fc5b4ecf512bc61d777 2007.0/x86_64/pdftohtml-0.36-5.1mdv2007.0.x86_64.rpm \r\n d52fb3abbff1579eb3ca70aacac01273 2007.0/SRPMS/pdftohtml-0.36-5.1mdv2007.0.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFFr7TfmqjQ0CJFipgRAtRNAJ9xsaBrJx4c+xXnA7FYoHH1rTaBWACgkpFj\r\nq+qqAteSCHta5qNNTjQ3l9I=\r\n=PzqW\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2007-01-19T00:00:00", "published": "2007-01-19T00:00:00", "id": "SECURITYVULNS:DOC:15756", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:15756", "title": "[ MDKSA-2007:019 ] - Updated pdftohtml packages fix crafted pdf file vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:20", "bulletinFamily": "software", "cvelist": ["CVE-2007-0104"], "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2007:021\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : xpdf\r\n Date : January 18, 2007\r\n Affected: 2007.0, Corporate 3.0, Corporate 4.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\r\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\r\n to have an unknown impact, possibly including denial of service\r\n (infinite loop), arbitrary code execution, or memory corruption, via a\r\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\r\n attribute that references an invalid page tree node.\r\n\r\n The updated packages have been patched to correct this problem.\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2007.0:\r\n e34f95bfcc5bee00a123ee84d9e14aba 2007.0/i586/xpdf-3.01pl2-3.1mdv2007.0.i586.rpm\r\n 9fbbb1a928599ec327501ea350b8871a 2007.0/i586/xpdf-tools-3.01pl2-3.1mdv2007.0.i586.rpm \r\n 19112d086453c2fdb928011fe6f7aa0c 2007.0/SRPMS/xpdf-3.01pl2-3.1mdv2007.0.src.rpm\r\n\r\n Mandriva Linux 2007.0/X86_64:\r\n 76e9749a053f7162c894741884c89835 2007.0/x86_64/xpdf-3.01pl2-3.1mdv2007.0.x86_64.rpm\r\n f20e65b356ec330fd60e095add93d04a 2007.0/x86_64/xpdf-tools-3.01pl2-3.1mdv2007.0.x86_64.rpm \r\n 19112d086453c2fdb928011fe6f7aa0c 2007.0/SRPMS/xpdf-3.01pl2-3.1mdv2007.0.src.rpm\r\n\r\n Corporate 3.0:\r\n 39a410e5887ddda80b0a2c4541082d50 corporate/3.0/i586/xpdf-3.00-5.9.C30mdk.i586.rpm \r\n d4e017b43f39e1dd0e3d8367c62633d2 corporate/3.0/SRPMS/xpdf-3.00-5.9.C30mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n e01a2822cf592a56d89a13b73b8fa133 corporate/3.0/x86_64/xpdf-3.00-5.9.C30mdk.x86_64.rpm \r\n d4e017b43f39e1dd0e3d8367c62633d2 corporate/3.0/SRPMS/xpdf-3.00-5.9.C30mdk.src.rpm\r\n\r\n Corporate 4.0:\r\n 9899a75731800c052d32a7e8cfceedf4 corporate/4.0/i586/xpdf-3.01-1.3.20060mlcs4.i586.rpm \r\n 0c9969ce74ae66d95ff902181f83e0e5 corporate/4.0/SRPMS/xpdf-3.01-1.3.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 5d2343239f0e46efa4df3c81a0c14191 corporate/4.0/x86_64/xpdf-3.01-1.3.20060mlcs4.x86_64.rpm \r\n 0c9969ce74ae66d95ff902181f83e0e5 corporate/4.0/SRPMS/xpdf-3.01-1.3.20060mlcs4.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFFr7Y6mqjQ0CJFipgRAlm4AKDovSG9ZcNC+0wPIkPbAeKFjiO1GgCfVdtX\r\n8bsgpC4xTvUU6p70qCB5ffU=\r\n=4Q/3\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2007-01-19T00:00:00", "published": "2007-01-19T00:00:00", "id": "SECURITYVULNS:DOC:15757", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:15757", "title": "[ MDKSA-2007:021 ] - Updated xpdf packages fix crafted pdf file vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:20", "bulletinFamily": "software", "cvelist": ["CVE-2007-0104"], "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2007:022\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : tetex\r\n Date : January 18, 2007\r\n Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\r\n kpdf in KDE before 3.5.5, and other products, allows remote attackers\r\n to have an unknown impact, possibly including denial of service\r\n (infinite loop), arbitrary code execution, or memory corruption, via a\r\n PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\r\n attribute that references an invalid page tree node.\r\n\r\n The updated packages have been patched to correct this problem.\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2006.0:\r\n b0e9b86776c418b948d8574d5d9cbd49 2006.0/i586/jadetex-3.12-110.3.20060mdk.i586.rpm\r\n c2338788f1ab57520c0082392ed79a4d 2006.0/i586/tetex-3.0-12.3.20060mdk.i586.rpm\r\n 23f6c5d99c6d75d8299858f2f1762570 2006.0/i586/tetex-afm-3.0-12.3.20060mdk.i586.rpm\r\n 38ce0c5b942ecbbeecbeb2e67b0fc575 2006.0/i586/tetex-context-3.0-12.3.20060mdk.i586.rpm\r\n fae0147ac3122354c573418a5e2b933e 2006.0/i586/tetex-devel-3.0-12.3.20060mdk.i586.rpm\r\n 4ea3b6d4bac953feacdafec3b0716a75 2006.0/i586/tetex-doc-3.0-12.3.20060mdk.i586.rpm\r\n 3cea7fdbe482dba0fdccb423e59c0687 2006.0/i586/tetex-dvilj-3.0-12.3.20060mdk.i586.rpm\r\n de6a3d7a548c55476ac8ffbce57867f2 2006.0/i586/tetex-dvipdfm-3.0-12.3.20060mdk.i586.rpm\r\n 394aaf123e290414c429c0e83e007928 2006.0/i586/tetex-dvips-3.0-12.3.20060mdk.i586.rpm\r\n e7e1826411e5a655c13381bf8f8a836e 2006.0/i586/tetex-latex-3.0-12.3.20060mdk.i586.rpm\r\n 7a7304b0ff04cb5528b44ec4116dab00 2006.0/i586/tetex-mfwin-3.0-12.3.20060mdk.i586.rpm\r\n 478e42a89808a7a50de49d5824981961 2006.0/i586/tetex-texi2html-3.0-12.3.20060mdk.i586.rpm\r\n 9f2641d71a55e2ca887a43ef4965b32b 2006.0/i586/tetex-xdvi-3.0-12.3.20060mdk.i586.rpm\r\n d5b7ff7afc8bf10f923d198b12a2eef7 2006.0/i586/xmltex-1.9-58.3.20060mdk.i586.rpm \r\n dfac4ea9ee368da19133c7ec734f4df9 2006.0/SRPMS/tetex-3.0-12.3.20060mdk.src.rpm\r\n\r\n Mandriva Linux 2006.0/X86_64:\r\n 9ef912b94f8f55197ddbb2123e30a25a 2006.0/x86_64/jadetex-3.12-110.3.20060mdk.x86_64.rpm\r\n 1c01bcd9a4fa2982694492210de47089 2006.0/x86_64/tetex-3.0-12.3.20060mdk.x86_64.rpm\r\n 4d00faf564d28b45374a57f91e5aacb9 2006.0/x86_64/tetex-afm-3.0-12.3.20060mdk.x86_64.rpm\r\n 139a0ee822471c2562eab654142f34f4 2006.0/x86_64/tetex-context-3.0-12.3.20060mdk.x86_64.rpm\r\n 5dbf547b972213623d879c201eaf7d26 2006.0/x86_64/tetex-devel-3.0-12.3.20060mdk.x86_64.rpm\r\n 8080633d08582fac2b2b2084e0e1c14e 2006.0/x86_64/tetex-doc-3.0-12.3.20060mdk.x86_64.rpm\r\n eea2f40c602d83eab0abcf01065c9e27 2006.0/x86_64/tetex-dvilj-3.0-12.3.20060mdk.x86_64.rpm\r\n 93a9c2c81cebe89e71c386cb122684ca 2006.0/x86_64/tetex-dvipdfm-3.0-12.3.20060mdk.x86_64.rpm\r\n f370373047439ff20285c560c62d15bb 2006.0/x86_64/tetex-dvips-3.0-12.3.20060mdk.x86_64.rpm\r\n aac948de1110ed6cd6bec349185c469e 2006.0/x86_64/tetex-latex-3.0-12.3.20060mdk.x86_64.rpm\r\n ad1b17cdaaeaddcb50ccecca995b40bf 2006.0/x86_64/tetex-mfwin-3.0-12.3.20060mdk.x86_64.rpm\r\n e0a894fef728129a9c4adaf489b2d4c9 2006.0/x86_64/tetex-texi2html-3.0-12.3.20060mdk.x86_64.rpm\r\n 7be9509ba2bae53fd5e5dad6726319c8 2006.0/x86_64/tetex-xdvi-3.0-12.3.20060mdk.x86_64.rpm\r\n dac1e6dbb15c0720ddee363e1fca40c8 2006.0/x86_64/xmltex-1.9-58.3.20060mdk.x86_64.rpm \r\n dfac4ea9ee368da19133c7ec734f4df9 2006.0/SRPMS/tetex-3.0-12.3.20060mdk.src.rpm\r\n\r\n Mandriva Linux 2007.0:\r\n 78124b41f0f99ef02b030db387b7d0be 2007.0/i586/jadetex-3.12-116.1mdv2007.0.i586.rpm\r\n 0ba38db61f2ac0cfca4017d5a421c371 2007.0/i586/tetex-3.0-18.1mdv2007.0.i586.rpm\r\n ac07abe40f118a50d4d02480e6fc6acf 2007.0/i586/tetex-afm-3.0-18.1mdv2007.0.i586.rpm\r\n 9b2cc8802dbbd9987fc8e27fc2cd4fa6 2007.0/i586/tetex-context-3.0-18.1mdv2007.0.i586.rpm\r\n 26bf31a911285913987b47d84ab972e6 2007.0/i586/tetex-devel-3.0-18.1mdv2007.0.i586.rpm\r\n 64548fd5d941e14ad9040b0682be073f 2007.0/i586/tetex-doc-3.0-18.1mdv2007.0.i586.rpm\r\n 327b14eb8a8e906b3c671dd2550e23c6 2007.0/i586/tetex-dvilj-3.0-18.1mdv2007.0.i586.rpm\r\n c10d7f14ac918ecf1346c5602e4702b1 2007.0/i586/tetex-dvipdfm-3.0-18.1mdv2007.0.i586.rpm\r\n 991f7f24ce100c5b1bd650635df534a6 2007.0/i586/tetex-dvips-3.0-18.1mdv2007.0.i586.rpm\r\n 55c23ef379b549f3bf295d7f22eedd3d 2007.0/i586/tetex-latex-3.0-18.1mdv2007.0.i586.rpm\r\n 910a0ab053d49d72beba7dbb8dcfb67d 2007.0/i586/tetex-mfwin-3.0-18.1mdv2007.0.i586.rpm\r\n d4d79d3ec2e942950a900b0e264dd352 2007.0/i586/tetex-texi2html-3.0-18.1mdv2007.0.i586.rpm\r\n 47569ddcae890f450423c6b7637052c4 2007.0/i586/tetex-xdvi-3.0-18.1mdv2007.0.i586.rpm\r\n de84b77612fdcb65dc0b492ef035948a 2007.0/i586/xmltex-1.9-64.1mdv2007.0.i586.rpm \r\n a25e245f8899b029e6f66628da291ff5 2007.0/SRPMS/tetex-3.0-18.1mdv2007.0.src.rpm\r\n\r\n Mandriva Linux 2007.0/X86_64:\r\n 484cde452f6dc278ffe7bf8471c5b2a1 2007.0/x86_64/jadetex-3.12-116.1mdv2007.0.x86_64.rpm\r\n 18828e699d7b3c300ea61079266ec72f 2007.0/x86_64/tetex-3.0-18.1mdv2007.0.x86_64.rpm\r\n 67724adf4f8afbcd5f89eb8006bc5af5 2007.0/x86_64/tetex-afm-3.0-18.1mdv2007.0.x86_64.rpm\r\n 96e26248638f41b4bc7d5f3e871649c5 2007.0/x86_64/tetex-context-3.0-18.1mdv2007.0.x86_64.rpm\r\n dbb59278fcf549d35312f90112b5e168 2007.0/x86_64/tetex-devel-3.0-18.1mdv2007.0.x86_64.rpm\r\n 869e43a9aa80df4c676a768c36a9e117 2007.0/x86_64/tetex-doc-3.0-18.1mdv2007.0.x86_64.rpm\r\n 4e98e1172c41a8cfd87e16789e08d582 2007.0/x86_64/tetex-dvilj-3.0-18.1mdv2007.0.x86_64.rpm\r\n 3db0e91bea2b31540943e23d287c4a73 2007.0/x86_64/tetex-dvipdfm-3.0-18.1mdv2007.0.x86_64.rpm\r\n 056a25922526c43ae74c4540110b363c 2007.0/x86_64/tetex-dvips-3.0-18.1mdv2007.0.x86_64.rpm\r\n bf89943fbb35e5be431ddaeeb6874c0b 2007.0/x86_64/tetex-latex-3.0-18.1mdv2007.0.x86_64.rpm\r\n f30fead5ed7b9383a5508b8064688b87 2007.0/x86_64/tetex-mfwin-3.0-18.1mdv2007.0.x86_64.rpm\r\n 21a1d9f09f9c284a6098138490807c7a 2007.0/x86_64/tetex-texi2html-3.0-18.1mdv2007.0.x86_64.rpm\r\n 8cd846107a6ddd85d2be0f3caef277fb 2007.0/x86_64/tetex-xdvi-3.0-18.1mdv2007.0.x86_64.rpm\r\n 43a0155e8b9b4bc75248d6d4a7f8c1f8 2007.0/x86_64/xmltex-1.9-64.1mdv2007.0.x86_64.rpm \r\n a25e245f8899b029e6f66628da291ff5 2007.0/SRPMS/tetex-3.0-18.1mdv2007.0.src.rpm\r\n\r\n Corporate 3.0:\r\n c93214160b8e8ebb0f791b1926f234a5 corporate/3.0/i586/jadetex-3.12-93.5.C30mdk.i586.rpm\r\n 5b364cd2a2217aaf80d17cf179acae98 corporate/3.0/i586/tetex-2.0.2-14.5.C30mdk.i586.rpm\r\n dccc24883880adc4e5e0f9983217abe6 corporate/3.0/i586/tetex-afm-2.0.2-14.5.C30mdk.i586.rpm\r\n 74f1e2c5ee35b0a8d7552a39812a1f38 corporate/3.0/i586/tetex-context-2.0.2-14.5.C30mdk.i586.rpm\r\n 3c896ce2f2ef58b76a481e8058562d72 corporate/3.0/i586/tetex-devel-2.0.2-14.5.C30mdk.i586.rpm\r\n 6edb72131045c5727b1b87d5ceef0987 corporate/3.0/i586/tetex-doc-2.0.2-14.5.C30mdk.i586.rpm\r\n 08de572c8270a71603b13b436acd64c9 corporate/3.0/i586/tetex-dvilj-2.0.2-14.5.C30mdk.i586.rpm\r\n aba5bee10035b9b1b57ce92dd90f989d corporate/3.0/i586/tetex-dvipdfm-2.0.2-14.5.C30mdk.i586.rpm\r\n c7976d0df3677f7949f220e2fbc99392 corporate/3.0/i586/tetex-dvips-2.0.2-14.5.C30mdk.i586.rpm\r\n 1a83b7e2aaa33cb96a7c9aa35e77bda1 corporate/3.0/i586/tetex-latex-2.0.2-14.5.C30mdk.i586.rpm\r\n 1bbe133477dfbe8f2eed96b90cf26662 corporate/3.0/i586/tetex-mfwin-2.0.2-14.5.C30mdk.i586.rpm\r\n 1d487a5ffa6b68a868228cdeaa20d832 corporate/3.0/i586/tetex-texi2html-2.0.2-14.5.C30mdk.i586.rpm\r\n 0bd2f1246a1571af99941c692cc20110 corporate/3.0/i586/tetex-xdvi-2.0.2-14.5.C30mdk.i586.rpm\r\n 2224bd1105bf725dcedc9292fa518acf corporate/3.0/i586/xmltex-1.9-41.5.C30mdk.i586.rpm \r\n 8b5a4a4f6d5ff4d98a1281af2d71d36c corporate/3.0/SRPMS/tetex-2.0.2-14.5.C30mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n 2d926e3bd8f634ac9c1e5f89df19a85d corporate/3.0/x86_64/jadetex-3.12-93.5.C30mdk.x86_64.rpm\r\n f758927c4a9999282f38a13fbcc8d0ed corporate/3.0/x86_64/tetex-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 8d2da57380f45c588845ee97aa574d2b corporate/3.0/x86_64/tetex-afm-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 4f6daa6ef092dd5a2f849ef8de52407e corporate/3.0/x86_64/tetex-context-2.0.2-14.5.C30mdk.x86_64.rpm\r\n fea3921e3e9f4856d1e613d48370c057 corporate/3.0/x86_64/tetex-devel-2.0.2-14.5.C30mdk.x86_64.rpm\r\n f58957bfe6c337c4d0aea6332457fb88 corporate/3.0/x86_64/tetex-doc-2.0.2-14.5.C30mdk.x86_64.rpm\r\n d60dd82115164e40b35528dc494075bb corporate/3.0/x86_64/tetex-dvilj-2.0.2-14.5.C30mdk.x86_64.rpm\r\n fe5f1393c2ad00c391a59c013fdd225b corporate/3.0/x86_64/tetex-dvipdfm-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 77a8c2a7f786d5fe251a3cf6ad56f8a6 corporate/3.0/x86_64/tetex-dvips-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 1ec612e9e803307a1b9cc9b70b6d1eec corporate/3.0/x86_64/tetex-latex-2.0.2-14.5.C30mdk.x86_64.rpm\r\n a853b831d61d6e2907664a34cda3d2e6 corporate/3.0/x86_64/tetex-mfwin-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 9c1502657d6a692445d7c05c0bc08760 corporate/3.0/x86_64/tetex-texi2html-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 9be9f52a507ed56fd05baa7f5d612dd7 corporate/3.0/x86_64/tetex-xdvi-2.0.2-14.5.C30mdk.x86_64.rpm\r\n 60ea5b041fa70f46ae8104a04843110c corporate/3.0/x86_64/xmltex-1.9-41.5.C30mdk.x86_64.rpm \r\n 8b5a4a4f6d5ff4d98a1281af2d71d36c corporate/3.0/SRPMS/tetex-2.0.2-14.5.C30mdk.src.rpm\r\n\r\n Corporate 4.0:\r\n ddac4526b56f24eb774fcf37a0381ce7 corporate/4.0/i586/jadetex-3.12-110.3.20060mlcs4.i586.rpm\r\n 51de65ad28fa07098366fc2c875df20c corporate/4.0/i586/tetex-3.0-12.3.20060mlcs4.i586.rpm\r\n 0527185de5a39686833f03bb991db5d3 corporate/4.0/i586/tetex-afm-3.0-12.3.20060mlcs4.i586.rpm\r\n e2826e0f0a22d3548d02ca8fd4c922cd corporate/4.0/i586/tetex-context-3.0-12.3.20060mlcs4.i586.rpm\r\n 8e6575f0ac52785ea4163ec064999079 corporate/4.0/i586/tetex-devel-3.0-12.3.20060mlcs4.i586.rpm\r\n 6529f3ba8b8c03b8938259048d9fba7f corporate/4.0/i586/tetex-doc-3.0-12.3.20060mlcs4.i586.rpm\r\n 51a47e7f97e550d63b2d61b7a96b48e3 corporate/4.0/i586/tetex-dvilj-3.0-12.3.20060mlcs4.i586.rpm\r\n 17dc8f10a492283c5121454dff0705c5 corporate/4.0/i586/tetex-dvipdfm-3.0-12.3.20060mlcs4.i586.rpm\r\n 03d91453c6c2ba0435aa7ba503dec417 corporate/4.0/i586/tetex-dvips-3.0-12.3.20060mlcs4.i586.rpm\r\n 071921ff5e769938e177cb5cd43d20b6 corporate/4.0/i586/tetex-latex-3.0-12.3.20060mlcs4.i586.rpm\r\n 479fcb92a32f627bbfb04522f1f7c89c corporate/4.0/i586/tetex-mfwin-3.0-12.3.20060mlcs4.i586.rpm\r\n 4bd0cbc69453954324dc592126bcbc67 corporate/4.0/i586/tetex-texi2html-3.0-12.3.20060mlcs4.i586.rpm\r\n 95e1b3bc49f2ab0ac317e5130a70a625 corporate/4.0/i586/tetex-xdvi-3.0-12.3.20060mlcs4.i586.rpm\r\n 0f32f2dad3a514a2fc8094ed5a1b712d corporate/4.0/i586/xmltex-1.9-58.3.20060mlcs4.i586.rpm \r\n 19ddb7ee7cab54ac851cd5ef399ff77e corporate/4.0/SRPMS/tetex-3.0-12.3.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 665879f7fd675b56bec3a9ec4785040d corporate/4.0/x86_64/jadetex-3.12-110.3.20060mlcs4.x86_64.rpm\r\n f3bd189b132457a659c16f683040f9f6 corporate/4.0/x86_64/tetex-3.0-12.3.20060mlcs4.x86_64.rpm\r\n be8f757d3991987a9eb706a04c74c261 corporate/4.0/x86_64/tetex-afm-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 093d2c02434148b7d54c19a145bc4672 corporate/4.0/x86_64/tetex-context-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 90f76b5938c48de76083aadfd61235b6 corporate/4.0/x86_64/tetex-devel-3.0-12.3.20060mlcs4.x86_64.rpm\r\n ad2f307b2b439f6d02e83b038a6c6750 corporate/4.0/x86_64/tetex-doc-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 64ae40ef2b0a71e88bc86cecac38e188 corporate/4.0/x86_64/tetex-dvilj-3.0-12.3.20060mlcs4.x86_64.rpm\r\n cf6c423a01ffb30206b7ab973576dc05 corporate/4.0/x86_64/tetex-dvipdfm-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 7f0758b87f1dd184267010edf2ae49c2 corporate/4.0/x86_64/tetex-dvips-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 584677a10b1f4dc829edc38347636ac2 corporate/4.0/x86_64/tetex-latex-3.0-12.3.20060mlcs4.x86_64.rpm\r\n f807370e1d34149ec4d3f8db0bb718eb corporate/4.0/x86_64/tetex-mfwin-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 30a5829e72c5694d38224cd6f1048684 corporate/4.0/x86_64/tetex-texi2html-3.0-12.3.20060mlcs4.x86_64.rpm\r\n 202b14f67f12f4390649a00cd677f5bb corporate/4.0/x86_64/tetex-xdvi-3.0-12.3.20060mlcs4.x86_64.rpm\r\n ae70ba2da64fc4bd7ea5e543d3921356 corporate/4.0/x86_64/xmltex-1.9-58.3.20060mlcs4.x86_64.rpm \r\n 19ddb7ee7cab54ac851cd5ef399ff77e corporate/4.0/SRPMS/tetex-3.0-12.3.20060mlcs4.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFFr7azmqjQ0CJFipgRAhgjAJwNJwlUAK2S+mIB17aKqmjN8WQJGgCguwgZ\r\nh8dpKOT8JiNu1YzvQKYYs/U=\r\n=xCS/\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2007-01-19T00:00:00", "published": "2007-01-19T00:00:00", "id": "SECURITYVULNS:DOC:15758", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:15758", "title": "[ MDKSA-2007:022 ] - Updated tetex packages fix crafted pdf file vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:20", "bulletinFamily": "software", "cvelist": ["CVE-2007-0104"], "description": "=========================================================== \r\nUbuntu Security Notice USN-410-1 January 18, 2007\r\nkdegraphics, koffice, poppler vulnerability\r\nCVE-2007-0104\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 5.10\r\nUbuntu 6.06 LTS\r\nUbuntu 6.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 5.10:\r\n kpdf 4:3.4.3-0ubuntu2.6\r\n kword 1:1.4.1-0ubuntu7.5\r\n libpoppler0c2 0.4.2-0ubuntu6.8\r\n\r\nUbuntu 6.06 LTS:\r\n kword 1:1.5.0-0ubuntu9.1\r\n libpoppler1 0.5.1-0ubuntu7.1\r\n\r\nUbuntu 6.10:\r\n kword 1:1.5.2-0ubuntu2.1\r\n libpoppler1 0.5.4-0ubuntu4.1\r\n\r\nIn general, a standard system upgrade is sufficient to effect the\r\nnecessary changes.\r\n\r\nDetails follow:\r\n\r\nThe poppler PDF loader library did not limit the recursion depth of\r\nthe page model tree. By tricking a user into opening a specially\r\ncrafter PDF file, this could be exploited to trigger an infinite loop\r\nand eventually crash an application that uses this library.\r\n\r\nkpdf in Ubuntu 5.10, and KOffice in all Ubuntu releases contains a\r\ncopy of this code and thus is affected as well.\r\n\r\n\r\nUpdated packages for Ubuntu 5.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.3-0ubuntu2.6.diff.gz\r\n Size/MD5: 193950 e2bee82e1d213b4b3f08d8e358a2e452\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.3-0ubuntu2.6.dsc\r\n Size/MD5: 1450 9cb1d127d658e9a058c722e7d76f3b4e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.4.3.orig.tar.gz\r\n Size/MD5: 8067314 778d7159d185220af63066bfcc768211\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.5.diff.gz\r\n Size/MD5: 177220 a6bd4265af08126e5a88b6c8099e50de\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.5.dsc\r\n Size/MD5: 1049 208b62df92282f92d7817dd522bb6012\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1.orig.tar.gz\r\n Size/MD5: 21026614 9e214aef83d2a9a6485a831a67b7bcfa\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.4.2-0ubuntu6.8.diff.gz\r\n Size/MD5: 110435 ac50706ba88ca4f03faec6886ba89fa3\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.4.2-0ubuntu6.8.dsc\r\n Size/MD5: 1655 19eb32a28de121c405df00b7e574a418\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.4.2.orig.tar.gz\r\n Size/MD5: 777935 beb1eea135a3c5b679a7a22d01a500c0\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-doc-html_3.4.3-0ubuntu2.6_all.deb\r\n Size/MD5: 144576 1a94ef45fc1fcb8495c10a1bb7221cbe\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics_3.4.3-0ubuntu2.6_all.deb\r\n Size/MD5: 19498 22891a024f4b641e4f63755ae3358e99\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.4.1-0ubuntu7.5_all.deb\r\n Size/MD5: 634914 0839718fa460a88db44defee1807cbf0\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.4.1-0ubuntu7.5_all.deb\r\n Size/MD5: 688550 eaf1ad2b849c8680a83e39e55e13e75d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.4.1-0ubuntu7.5_all.deb\r\n Size/MD5: 326438 cd9f767892463b02a78d5dbdbf0c7a7b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.4.1-0ubuntu7.5_all.deb\r\n Size/MD5: 23056 6be32882ca89fa758c06dd9259084684\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 92566 1bb96a07a13d0ddbe698bb6c0cc94d1b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 433172 7208155cdc3e2a0ac33107e981f82e32\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 961062 22fda741387dba2305fdae8f6af31b3f\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 108866 71b5906ab7ca4f9517d75eefc899ec1b\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 67458 deac38a150ecdfeedb884b41e18525cd\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 270138 71d34adbc039e8c5d44e34fc3099d80b\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 526610 0a4aa2cff75db7f6140475acc8bffda9\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 156996 e919c48ae77ff6d4269e1921c3242e56\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 707928 60cf9254e54346f8264eca29a69a2275\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 85022 c7c8c48351bdf7d7e630803c901fa719\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 244420 3cacd2a77036242c4ed7688a30c0f63f\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 150172 10762c1d498d133f32bfb1568bac2a77\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 167164 7f52c65fcd99201de6832b16012e6c46\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kmrml_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 238674 24e4879fb7c058cf3a6cd0de651f8863\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 178622 27358fc0b84e84628334b3177f9acb40\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 5552620 38ddf7934a2bbb4d1903e71f38a06fb2\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 816460 74a9af338cbb033a04aa89a2ade3f44d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 768312 835c0da9daf7d6d048406cf285663d44\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 106826 266a37031a64ce50489da0bf83802cda\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 690936 373ac5609cedf3dcb3773fc4efd3ff71\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 2291582 08a9134f7d8a59d7d031084371432a85\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 2895672 cb48698fd7c53f4c77dda263acd37a86\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 2574996 8bc367073adb6097d9ff001e5b1d7e37\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 66938 33cb646c2f32623ab161696632c586f6\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 146586 bbf8d1b8d444ba38ed6dca74b71427ff\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 1035176 789f47423ba19f41beddd8c541012612\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 1251894 f5eb10b43c744dd21a57c0121678e347\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 327504 48cf1c5ae9d231b5e6866ed3ca88c121\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 481582 6592a3b5ee82138c4912d124c3150122\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 481730 b32804110af8e3eccd060e3487eb42a5\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 699476 b8e1d06da71085c3296f28ce67456f17\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 270018 c1f396880390f3f16276ba9422ed5fe2\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.5_amd64.deb\r\n Size/MD5: 5736804 96fd6d22f98abc804fab09743ff6fd5e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 19344 076f85f97b456394bcbd671afc0480c5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.3-0ubuntu2.6_amd64.deb\r\n Size/MD5: 143924 9a020dcaea2ef7215ed193d610f77da5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 612672 b7abeaf5affe1b1ff705b9cbeb44fbed\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 44502 7016dc1d7d73c0a9c6a0ec986ffafbe6\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler-qt-dev_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 29794 ab0fa164c577b220207c7e66d0a5e474\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2-glib_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 40156 9d663bc9f2a903c2fe06a91214d856c9\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler0c2-qt_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 28500 9ef31f9d846e24750f3e28ac1cdc3523\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 456364 f3a127b5c8391f2efd25c271a765f23f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.4.2-0ubuntu6.8_amd64.deb\r\n Size/MD5: 82960 8f5e15efe40713fd206064883cad61a0\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 85656 cc325f334480744968f19fe7df6d7b78\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 377566 b0bb4d608cb3d2512d7a90c3356a994c\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 955028 f5bf14101a760873b76207e8e47ea2af\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 99764 94b4454f02e211545104a0ee97d15035\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 67458 32160e4a0cac10ce0afe67ba3764eded\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 224790 31d131cfb88b08bf37fa78be77d0a86f\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 510144 e9108385216caabceb883e0166a275ab\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 148334 3bc7717099128b7e5208adbfdb41338f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 701490 10d66a07dcfa70c31d60b291372cc6f6\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 78754 3280c4b69fafd2f97030d0a3ecf23575\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 226408 1fc91dad3c4629711306aef549a3e177\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 137234 a28e5ae438a589697db46793286436ae\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 153498 6af6b2722ffae9816d63927b19cff7b3\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kmrml_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 212306 51bf94c37298e2888c0ee014ad1be6eb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 178610 71bc8f16f3d0c184fbfdfdad3f819b1e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 4949962 85ca600dc879fcbec27d62121ba73de2\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 768152 4c827dbe13001c8adb7c3bc15839ae0a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 749100 9656c7b56756eda64bf69991d68bb278\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 101346 0e2d3ea3d5ccf69fbbfd08bfca44b070\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 616972 ac36a164d1c99877c6dce07cfb6de51a\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 2147938 86e0cacca21db4173bdcb72db750b3b9\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 2786214 7e413d62a040ae68f6dbe012f274b94f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 2495580 d28caf3935aaa6ff65a15dd9280c3659\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 65236 e6232dc0f95419ec85b372b954af65a4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 142364 cf721f293cfd96fca9ae47100ea6065e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 967158 40454bf7d6f55c6a810b9c5e072d677e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 1198868 82415bae2df57d57209370f08cd3a6f8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 322538 c576ab8b8c1bfba0fb377cdb71223350\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 449718 acd6cadbc74eb2860f5f069693d55d06\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 469692 381afec232755e6f2bd27e6d0513daad\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 655034 33068d090f55bed0a25851dea7261500\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 243490 131a6c97ed078aeeeec973d45f922efe\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.5_i386.deb\r\n Size/MD5: 5463488 2536f41d5d8f33e727aa3862d15095fd\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 19342 ba676d95ddc8eac661c29584d5df1f36\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.3-0ubuntu2.6_i386.deb\r\n Size/MD5: 129070 ccd5f60ac058136cfda79499dc2a5699\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 550230 b567d1da9ccf5ad01807f7c0b3a6399f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 41714 1e090e74bd271b59f1086e002984c2bc\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler-qt-dev_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 28732 ac9dc3fab3921aa762873968aba48b8e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2-glib_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 38628 2cd8727f4dc48febb9127ad7e7f3e216\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler0c2-qt_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 27840 499640d17e51742e5fcee93a19a7d630\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 416716 16576bbaa6fcbe04b6e6ff8685b1366d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.4.2-0ubuntu6.8_i386.deb\r\n Size/MD5: 77320 a7f9f90a8425b5edad5bb4a6b6d2afd4\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 88286 d1a894627655e7c1a957638b6f8ebc46\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 430766 beeeda7bfedbab21daef7533167d0287\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 965240 8f9efdef3c2055e9af386e3d836a48b1\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 103828 b29b30762d2935fa93a7605c4e90b6dd\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 67458 f6f84b4e0ca1c667bc8e119ba2ef84ac\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 267354 efefe8ca218518282383b7bdb5fef995\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 515948 acb808f7e33c57a29c221c309c2fec9b\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 152876 6b1cc7690917279fff0f7c733e8e5a5c\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 706544 1a6b7180a0b1e4a6908e71b34711a826\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 81072 a06cd5eccbbbb2f96c67808497c9ffb0\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 230812 2a018f86444da666e56be3e4125d2cdb\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 140626 8d560d2b28adfbdbcba01a9e9b54fce8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 170588 27fd3b2e2cb67c1b851b6491ce52b803\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kmrml_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 226376 b2f810f37165c458ad34ebf6e89246ff\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 178612 b886bb78579fff11fbcb18fdba764b95\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 5218716 3792dae2e2db9b12574dddce97451237\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 778228 daa86b9f91fa7ba15b5c2bfde02ae8cc\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 753820 88da4cefa07bc7b3c20720b372f34da4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 105328 f5664df96d74366e19e7a8092339d795\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 656430 084d61b2d2e42f2f10b02d6cb404a5df\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 2202192 a8a562e7a37cc174c0dc9669fd337f58\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 2831408 8cb03913cff7b586515074e9e2429991\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 2540110 4b453fe099d65fbdc706f7d74f2c5387\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 65346 5a691d185f23d4798042a1458f008e4d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 142912 c4e68986f9852c94578bb06e054a400a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 996588 13476c053b34f3a3be6fc8fb8f61078c\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 1237818 92eadccb5a78be164a3411d1eeb6b52e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 329438 4dac4e07d9d0fe2baa1287fbbb6d6213\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 466904 2e184ea5db5e0057f57a3bf3462c8aa7\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 475922 e25b8ed1ebaa3c2ad75f5bb2eb0aeb4d\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 694682 1f73d1f6417fa37def0d53da4321231d\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 252144 e42b967ad9b0a588f1bfb60a5d26c289\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.5_powerpc.deb\r\n Size/MD5: 5618676 499e018760079a26caac842e7c5be033\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 19346 3b61d754abd9551171cf3259b2b4a300\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.3-0ubuntu2.6_powerpc.deb\r\n Size/MD5: 132470 e4263bfde9091ea53712a4d1cd56c745\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 644830 0b079d7b51ef6f5a16c65238f4512f48\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 46650 3b754947d121d0415ec1bbe1357e6b62\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler-qt-dev_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 30116 d1e99d30889f05985cfc5eb49e0a6b19\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2-glib_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 41646 c585bd93345939baba81c59d487f3133\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler0c2-qt_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 29984 b199c1d4c2977957d59f3948048edc53\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 458464 5ea76630244bd80d2872129c56a1c0ca\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.4.2-0ubuntu6.8_powerpc.deb\r\n Size/MD5: 88006 136c10a9d13ec7f507174dbe95d422ca\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 85364 96baaa8e07938497d3bd1e7e9529130c\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 384616 7f886f7c04c7335b44511d363dc6f434\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 956488 13031694d47d1d95a25a0a72b77d86fd\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 99996 89bf8efd21b3e37823a52d63f1359cd5\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-dev_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 67456 162787290a1abbe73a09fdb3dc440890\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 230604 15602b8ebd5547ffa92686f464b4f580\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 515504 3f4862078b6943fbc97c40ce8eca390e\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 149374 222b88f8cc5389d164f0a416a3a8102d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 701556 9c51dbc802d9518962af888c5f7f391c\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 78720 36a1b68ac01593980cb2d3766c4673d4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 230708 22201b4e39ac093a9893c370062aa014\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 138440 84755218e5046c81612f2fdd0595adbc\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 151468 e5991ad4e7022c1d3c539132b135ecdb\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kmrml_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 217868 f0fa5bf3403c6da55b33a566cc87226a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 178626 6e0938ad1f2bf5557cf4441d8e5eb7c3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 5099754 69d72088a494a4832889b9884a80dfaf\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 766044 c649c6f6b233b6e398f11d7b31b6b217\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 752910 b9746ff7f312c8d899f502ca72e7fdb8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 101588 6f3ff5bae7a91d2abeaf0a23b01e0998\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 644040 c817336a17d564fb6f709d9e2b8d3ded\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kpovmodeler_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 2191380 6369aed8b0bf265dd406dee46df91f79\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 2815084 c5d07aa4856cbbdf235b38e81308652e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 2505244 1d7607bb828fc22f548fc04b6e80a717\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 64656 7cc62ada56c2003a3863b79d52cea226\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 142444 f1a2bd2e79c579525993d32185df20b9\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 977038 d0d2852a894f9ca0c9b5b423e52ace6e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 1204068 70ff352f76775a7093bf69ef0339fccb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 323030 31e142184bf45c82f800fc165326a036\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 450122 5508e2a440dbef1fdf013a9c89540b44\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kuickshow_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 473512 4992901f2532b2ac1108c29ad7cef83b\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kview_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 657966 0493ed87a6400491bccb5223ecbf2ec8\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kviewshell_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 248176 5d8ac89f9cd7f5710c9afece3b287497\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.4.1-0ubuntu7.5_sparc.deb\r\n Size/MD5: 5533704 4537dbcc77b0ff85470174a325338d14\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/libkscan-dev_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 19346 7c88f26d948966627998ec44efec4d70\r\n http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.4.3-0ubuntu2.6_sparc.deb\r\n Size/MD5: 130716 b211baffefa32a9d0f9a10270cd6d2ed\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 582664 0a77763add4f9cbc14590a5490da6441\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 43018 465efb0895bb956024f3a7d3320d8d5c\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler-qt-dev_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 29314 641e87f2898e9feb25aa56b27098a9e6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2-glib_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 39022 689ce5a2bf3998f6d286920e65df552b\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/poppler/libpoppler0c2-qt_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 27870 037f40c71286a6efefd1a8ea3b9ac106\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler0c2_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 433696 a8655de568778168f80aec69fb4f749c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.4.2-0ubuntu6.8_sparc.deb\r\n Size/MD5: 77186 7e9e029e7413378cef4d121d08d94305\r\n\r\nUpdated packages for Ubuntu 6.06 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.1.diff.gz\r\n Size/MD5: 300547 f131d4d02bd14b92812e1d0d330e14e3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.1.dsc\r\n Size/MD5: 1448 26a85c2f30806085f94db713f8ccfaa8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0.orig.tar.gz\r\n Size/MD5: 41765094 096962d7a25ec9063510b9340f18f152\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.1.diff.gz\r\n Size/MD5: 9299 0da6de1f41fa96ee870bb1adce4ec077\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.1.dsc\r\n Size/MD5: 1727 80f15c66add2c61e4e5105eb126a80d5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz\r\n Size/MD5: 954930 a136cd731892f4570933034ba97c8704\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 681820 7a754d72f0bbaf913457ed6b993b4336\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 747856 bf19c590353e73985035b2e4a62d1a1e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 464334 603add2751234e5a3ea961e889d659d2\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 88052764 c9ccfbf28e6e062019e81993f0211013\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 24156 4c13750625a39ebc3ef39dce9ef9c9ca\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter-data_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 1893332 05d053443c92daf55bf5f4f2df4abc4f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita-data_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 9816706 690f1dcb14c84c50d737238630131709\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword-data_1.5.0-0ubuntu9.1_all.deb\r\n Size/MD5: 1590216 9bd2fee94cc3840f94ece52b19d45887\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 1053244 a4d79f7806d720ca8d6e14a09e55792e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 1304920 1e7f9cf729af67ee113b9bcf573da703\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 3097236 f960f45d306c3d9878628dae01838257\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 419342 5b1a76f34d105e31ca8ddd2ced7e1586\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 609498 c9aad1e4f86320f53906a3fe76765207\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 52548100 d41eab17cd9b8ab5be32b80ba0635305\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 360200 9cc521e8e4c0c8ba6c6a80c6d0e9eb01\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 2564880 a4a0b2098e87ab49219440b18fdb3e25\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 201084 4a8af412480f2d36e4af85ceace873cd\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 919746 073bfc69531e65f72c7c1dd2dfacf954\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 1414884 6feee9f167c7172f1a3966be01772eae\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 2914464 e577324c684dec4815cf7f7af32e36a6\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 2461048 25edb70b736b9952d34f4735c2a0fc31\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 328414 11014939bce2a2400b6985e0c10c274f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 457482 fb492bc0f2337810321d42b9a18d5788\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.0-0ubuntu9.1_amd64.deb\r\n Size/MD5: 2797044 101900d9c582876c44e84ec7ae456464\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 719202 f1b7faa8e87065696d014ac6b4a00b78\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 57038 b9c097ebb4b2211ce1938494826f29be\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 46204 96d023750df4c1eace852711e9f86afe\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 51824 97dd5facac283f93ceab6f6f7a6516c5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 42434 255bbda58042ad970be382a28cf3b073\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 536316 d0bb2c5f41f71062611f351bbad43031\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.1_amd64.deb\r\n Size/MD5: 99780 cedbf6155b58331eb86a5bb6a0ce4b30\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 929618 4c21ed0da20072610d8b773240a3c3a3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 1232058 d6eaca6d9bab8c77b35373722d239bbe\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 2917538 eddb1dab26ac95f31aebe43b0da91b1e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 411496 6179e2dc3021cac191bbb033f34e2c98\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 539538 a71ef2a1831f8d0bbb99fab12fb3754e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 47137550 8e99ec923ccaf86963a169815508c1b5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 360072 789e388e0ac4ab18fba82ae9fb4abd7b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 2315142 e10c5bef3ebde9ab8bafe9fa0f0d5090\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 195162 6ebf38e29fb37a9778c5e9840576a11c\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 842578 0e1c868a536bc927ff45fc0fff3cf57f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 1277046 eeff2743c156a8c7331843aa190d5938\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 2577806 dfb8694e45aa606d140b079c29d7ea87\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 2276128 742253b049f58d4545feca75ba26c5d3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 324290 24a2705ff7f7130bbe66223d8e942295\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 436700 64eb61b62da8bede2249125e2ab4e981\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.0-0ubuntu9.1_i386.deb\r\n Size/MD5: 2521970 3da33b8c6350052842e05b552fd3d10f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 651310 79f21ec44ee0df679953d594dafd60cc\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 53736 395a8a3974031bce491732919ee34190\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 44194 67538735fa42675b8da499d82ec30a42\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 49716 d12562130d35b54a16aa8436bb3521d1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 41310 960e417a45ee3e5018dcfda28699ec27\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 494322 dacaea373e4f0dbd62e60b68871f885e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.1_i386.deb\r\n Size/MD5: 92936 47a714c8f72f30640bf2e6cdbfb82ead\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 1006280 e1cc28cb58388ceccbfd75cfae5c533f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 1279510 a2b1468dbd88d339a40bdbc712200ba5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 3023890 68f47512f5359d9e48f369d7ed80372d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 417936 a528bc96191263d1c8ee488f21603b13\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 580588 e560bb0ffbdb2f61fa07a6f18b73d69f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 53356718 60d1bda7f2e0384b08c4959d31b6f4a6\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 360204 fa3de5ebfa9c5e06709d59af46d7d1f4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 2445828 c61b69cb0dfc43dacf7991b16786e84f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 200436 d67b07a871de9d5983bd15983e748977\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 865538 e05494ff5501689073f584d652fa87b2\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 1333794 9948fdfd88be74e9b5194a21b96af08d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 2825718 28629347c123faec4e98a3af1af6bad0\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 2347546 e7c25ade68f8db2dc03be93a6cce20c6\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 329988 1e4a0742b2f76d12336dca2c59771bb7\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 454178 bad08d769a1b7bdc4219cbd11e15e112\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.0-0ubuntu9.1_powerpc.deb\r\n Size/MD5: 2667416 d243171be3a67c96ed4f7735df7b5b5a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 758306 66388e7fb16181b44568ddd242897eb0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 59030 42d7ed1bdc81292dd19bcd6a7690675f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 46332 2241aa1fe7d896a4f22e75fe60a13880\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 53046 ab2e980cd3facc2aece80e2b397afab1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 43680 52fe482ca67e8070c99424b081ae42f3\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 542172 027172d5f989becb7ca6362d3587a67b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.1_powerpc.deb\r\n Size/MD5: 104342 d91d7586411ae509c88c0a6d91edab41\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 963060 3eec267cd5015063bccae06b11f25511\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 1252814 2e19e2da5d48e97111bca515b5a0499a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 2919754 9fb6f905dc1f7a0fa61c0895f2e4a7ab\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 411526 4564014e042543ed22cbd674083a5f88\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 560416 6c83118c859eff3e0e2cdb19f53717c8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 48837706 4282f6f9163fe3ca040bcd32d74c54bb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 360212 08cbe25372ad5aa2f14cd56ed1f9071b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 2353068 2bb6062427d122d94e9d2a04e39e2715\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 195394 d8338506aa8a5ce1c19fb77347725edf\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 857536 ac7c458623b3fc49e512841c0aa959bb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 1311332 d1c6447756584869da8bc79e58ded582\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 2668972 96b755bccd318cc5518178022ec1d182\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 2319722 7d529ccac0d11c063d5cbb55229c7c4d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 324764 95104461431268cf8db864187e23c407\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 432178 7993f7a3b3760f91d13c0a0c72467e22\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.0-0ubuntu9.1_sparc.deb\r\n Size/MD5: 2587050 6e3302481a18d455df8bf1d6f9255939\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 680942 08c6fb335250ad4ce035037074505354\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 55360 8451ad4e62f3d6c7d7de426b23698264\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 44886 67dc76b6c40412814ecffa0d7c389938\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 50118 8b7f002bc7a76cb2b1819c529e75cf51\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 41162 abc22a3936d5c3ed15d944a2614af120\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 507902 9578a0bf0f511f33d44d76e3c2f36c57\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.1_sparc.deb\r\n Size/MD5: 92342 f48868be2000dfd70976f3023ec1f6b3\r\n\r\nUpdated packages for Ubuntu 6.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.2-0ubuntu2.1.diff.gz\r\n Size/MD5: 291873 836b4f3bda8ccdb533d03d53cf8a7c70\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.2-0ubuntu2.1.dsc\r\n Size/MD5: 1450 5320985b23272cbfe43ad286f99d09b7\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.2.orig.tar.gz\r\n Size/MD5: 41680992 9ec947e0de1b33df5ca0995fd02087dd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.4-0ubuntu4.1.diff.gz\r\n Size/MD5: 9185 ec4778ecad5b3f2125fa9fa48ae3dac8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.4-0ubuntu4.1.dsc\r\n Size/MD5: 1557 df39fe9f1dc5d0b631015bdc4057b93f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.4.orig.tar.gz\r\n Size/MD5: 1062401 053fdfd70533ecce1a06353fa945f061\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio-data_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 682906 cb36e98e3ac9ee241912c68fb5acccfb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-data_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 748644 10d6c6f4fb43d2993062f344f2f05371\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc-html_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 467320 8d26096289d415878357def7f00fdde9\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-doc_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 88580956 1a15e09d2d016fb37429ac6b032bc054\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 24488 ccbd4bb212eeb0d0ff8845567b1d5c82\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter-data_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 1896544 c651dee7e10fa6d599a958b187f6522d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita-data_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 9821152 6f6e483084c41cd61be47e038123e60f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword-data_1.5.2-0ubuntu2.1_all.deb\r\n Size/MD5: 1593746 226adf0f3de2049bb2db1ee8f0be0187\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 1052728 1d5cd6f2a3b488574595bfe4ef3fc1de\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 1305390 31c58fa469e4c546324097c341b974f3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 3098028 f0645ec2af3fddd0c8cf9b5a7520b2f5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 419152 170c70a1395f3ae941163592f3c0f3d4\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 609184 5c9ba270cf69965b4a433e90e40eba43\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 53496580 e211d1d31a482c298556d0c939707d43\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 368190 0ce3fe6bcee61cf6102c9fce388cc53e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 2603420 2aa63beeff5b46bc416d9c1c654ed9f8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 195468 dbaafa44ce02d276ad931dfdecacf4f3\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 919698 93f7204b6b784cfcbc8628a12d65aaaf\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 1409052 b65156c07ada9c1d9725fa4a95d8bce9\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 2867156 9b153e9f5ed93dc40efdfa6932366bc9\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 2468882 8fadc467b1b61beeec2d6add0848f8ae\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 329210 36e002fb7f0e8b4aafab972b91b65ba5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 457378 2a635e8da9525ff08d285a1585ddc227\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.2-0ubuntu2.1_amd64.deb\r\n Size/MD5: 2823462 27d0749d8a3fbf0b248067dcbe639c43\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 820048 f145b3fec8173a5d0bff1086c45ae88d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 65952 b300ec1fa7b2a547cd6ca49e9571bc98\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 69018 ce298b5a5016af591f9bea9d8d16d9aa\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 183102 b393d21698e81129e2a5fcdf0db2f588\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 60040 a4f7a113e7dd7bc530c2cf265b5eba17\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt4_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 151770 9e92972ce51c2a2a4201531fedd3a023\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 59696 fe0a030e758570e5b55d95745ea147a4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 583098 006d39ca4385bf511c561ec37f3ed03d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.4-0ubuntu4.1_amd64.deb\r\n Size/MD5: 107454 3b7e268dc8a45eae94675a886e5ea70f\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 964774 328814c815ca4024e0afdfb9ef0d5049\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 1253962 0d72e9dfa8fddee90c20b08bcae20199\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 2996088 49e0a17b93d32be4464572233e4edcdd\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 413130 e944a875ce34192130972c0ddfebcf40\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 556794 9e1e33911cabdc6c460f8fe17c007ccb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 52105026 f873e2fb636b5fe91911351b2b7e4cac\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 368166 338b90e1b5fa79d2b6e7b14f8183329f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 2418968 63425dee2c6f28b56294a8c61812a2dd\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 191208 b9ade36757d13e00b982cabaf65f193c\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 865036 b4e481851c92b7d7dcdb8b4fc7aa7a74\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 1313494 59e77527a09dd0f01af662b707d3ce65\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 2603772 3199575652af97d870f6017f7882fa11\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 2339590 a0a15a7bd7a7dfb1f6456fc0a41e028f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 325832 9816f894d19d45b237523d736665ce6a\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 442298 4a95786d1844e2a5de2dcf39117b5d52\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.2-0ubuntu2.1_i386.deb\r\n Size/MD5: 2632186 8b6e0df776507130297063e949ee0f1d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 764760 3546e8be313f1526e147dfeced3c0b67\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 63284 31a6d7e34b571ca92d1d6d2cb09f182e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 65064 369ff4169ae37459cd0d02b66fab9673\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 173848 2c997fa52e39116702d69ec2657f4652\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 58822 0789673f0f0d915c648f96ff92763321\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt4_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 148482 9b12151d1ccf0d0e69747d4d56901a88\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 58220 5787e502cc805a6f6fae89c067c7430b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 556364 0375baf6e3bdabf711a134557fb279ce\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.4-0ubuntu4.1_i386.deb\r\n Size/MD5: 102304 3b34c70001017bae01f36dcdca6fd59a\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 1016744 14fb8b722a995ebdbc8eccf48caa8a60\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 1283612 96cc6494ce454eaa5097a9da3d05211e\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 3047914 cfa816b24e3689c533543001f9a487f8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 417962 142a7e7cbcd378b620ec471ea715cb73\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 585882 5181b615771ccff4cd5e498dac1a9c07\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 55179852 e9c979eecb46d73cf5a2817719dc375f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 368204 9fa801be22805181ae63c3f220cdb1e3\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 2496878 cd4d194140a8f3cbe9a74c1c37f905f8\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 194326 be626deaa057c6f765fffeae2ad3b701\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 868298 a33bbeb62e0525645ab6f840fc07152f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 1341436 493820697dee94375441b709c3f0f98d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 2786886 cfd49bbe152f7462c1f09bd9155ebc41\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 2366464 8e1d4f27c3b4ef489fa14d618552e5d6\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 330796 32374d985884e792902a3113ad310b06\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 455176 96db1f914b8e7d545283b3ba03450c66\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.2-0ubuntu2.1_powerpc.deb\r\n Size/MD5: 2719932 42dc26514bb388556e7fee0e1b85e771\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 865656 b740e55bb48ab0e29fd893c8b5dae78f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 68232 19501e9ba47f1481f49f5e17afdbeca3\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 68954 6ba23464bbfdd8a3d2fc7e383a3984db\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 185920 a8397d2760c51e74ca2185d4920ad190\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 61208 65f9113e375e4bbaf0d80a7f62e9f9c1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt4_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 149766 b2d97503bb1d51e989ba34ce22ba72a7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 60430 34f1df63369754537cf1491a058a9710\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 592986 42abeec9b1f098174bce22babe7e1cff\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.4-0ubuntu4.1_powerpc.deb\r\n Size/MD5: 112384 7882594426ff9f5a5bf0893d011b2fae\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/karbon_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 970040 47733fdeee27e40621b11e2e062b0d7b\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kchart_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 1256044 9305215374950b3afe01867fdcf0fe08\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kexi_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 2929054 4479a3ca8bbc360eda03857ebf02ae38\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kformula_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 411380 30b1f570253ecdb81c9938e8ea98b3a5\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kivio_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 567238 73f0c62d65297d5523c38f2140d09b23\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dbg_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 51180306 89ea489f7da80399d4ebaaccf81b0a36\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-dev_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 368202 685688e1e157b93fc221b04da46c1715\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koffice-libs_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 2392546 eaea908eeb7e22926a26b1edfbc45b72\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/koshell_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 190170 c625f429584e5e4e7b5e332b1ffb6417\r\n http://security.ubuntu.com/ubuntu/pool/universe/k/koffice/kplato_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 856284 2cd32adbbab14d386f201dbe2bcf1570\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kpresenter_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 1315398 aee909585491bbabdf051fe05f44d48f\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/krita_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 2648748 c29515e4018e2e2ea022acced9c0bfeb\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kspread_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 2330380 b2b6e01b65f8b32ba2f707bde15753ce\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kthesaurus_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 325484 16a98d0ceb87fa668cd7d5219fdb5b4d\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kugar_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 446496 4c3a65f8388db1c5116c63db773fd768\r\n http://security.ubuntu.com/ubuntu/pool/main/k/koffice/kword_1.5.2-0ubuntu2.1_sparc.deb\r\n Size/MD5: 2630326 7eaf2455884dcc527d5a990297836cb0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 786630 2b2bd29fab6034ab4bbbc276c2416bc5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 64146 ad455601db717cf655f279adf7f574b7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 65098 4f0f917790ac075a83804c0370c009a6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 172706 5b36473ee8b80f0500a2dbf9f01aa0c9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 58240 eeee704160f67761207e9d010907a7a6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt4_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 148520 a4d6493516ee399f1ee9174f8f46e5c6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 57266 339a41c59d0106ede457b4707433a37d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 560060 ee7bde776f4fbb687faae2c41067a946\r\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.4-0ubuntu4.1_sparc.deb\r\n Size/MD5: 100332 b8b5e3eda2001f7b3fc56c969520d3a2", "edition": 1, "modified": "2007-01-18T00:00:00", "published": "2007-01-18T00:00:00", "id": "SECURITYVULNS:DOC:15749", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:15749", "title": "[USN-410-1] poppler vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:22", "bulletinFamily": "software", "cvelist": ["CVE-2007-0103", "CVE-2007-0104", "CVE-2007-0102"], "description": "Infinite loop on page model tree parsing.", "edition": 1, "modified": "2007-01-21T00:00:00", "published": "2007-01-21T00:00:00", "id": "SECURITYVULNS:VULN:7067", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7067", "title": "Multiple PDF library PDF parsing DoS", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-17T14:46:53", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 24, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : pdftohtml (pdftohtml-2475)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-10-17T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:pdftohtml", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_PDFTOHTML-2475.NASL", "href": "https://www.tenable.com/plugins/nessus/27383", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update pdftohtml-2475.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27383);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"openSUSE 10 Security Update : pdftohtml (pdftohtml-2475)\");\n script_summary(english:\"Check for the pdftohtml-2475 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pdftohtml package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pdftohtml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"pdftohtml-0.36-145.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pdftohtml\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:45:21", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 24, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : kdegraphics3-pdf (kdegraphics3-pdf-2565)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:kdegraphics3-pdf", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_KDEGRAPHICS3-PDF-2565.NASL", "href": "https://www.tenable.com/plugins/nessus/27287", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kdegraphics3-pdf-2565.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27287);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"openSUSE 10 Security Update : kdegraphics3-pdf (kdegraphics3-pdf-2565)\");\n script_summary(english:\"Check for the kdegraphics3-pdf-2565 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdegraphics3-pdf package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdegraphics3-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/02/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"kdegraphics3-pdf-3.5.1-23.13\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"kdegraphics3-pdf-3.5.5-43.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdegraphics3\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:47:23", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 23, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : xpdf-tools (ZYPP Patch Number 2474)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_XPDF-TOOLS-2474.NASL", "href": "https://www.tenable.com/plugins/nessus/29610", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29610);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"SuSE 10 Security Update : xpdf-tools (ZYPP Patch Number 2474)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0104.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 2474.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"xpdf-tools-3.01-21.6\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"xpdf-tools-3.01-21.6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:51:40", "description": "The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\nkpdf in KDE before 3.5.5, and other products, allows remote attackers\nto have an unknown impact, possibly including denial of service\n(infinite loop), arbitrary code execution, or memory corruption, via a\nPDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\nattribute that references an invalid page tree node.\n\nThe updated packages have been patched to correct this problem.", "edition": 24, "published": "2007-02-18T00:00:00", "title": "Mandrake Linux Security Advisory : pdftohtml (MDKSA-2007:019)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-02-18T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2007", "cpe:/o:mandriva:linux:2006", "p-cpe:/a:mandriva:linux:pdftohtml"], "id": "MANDRAKE_MDKSA-2007-019.NASL", "href": "https://www.tenable.com/plugins/nessus/24634", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2007:019. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(24634);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-0104\");\n script_xref(name:\"MDKSA\", value:\"2007:019\");\n\n script_name(english:\"Mandrake Linux Security Advisory : pdftohtml (MDKSA-2007:019)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandrake Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\nkpdf in KDE before 3.5.5, and other products, allows remote attackers\nto have an unknown impact, possibly including denial of service\n(infinite loop), arbitrary code execution, or memory corruption, via a\nPDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\nattribute that references an invalid page tree node.\n\nThe updated packages have been patched to correct this problem.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pdftohtml package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:pdftohtml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/02/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"pdftohtml-0.36-2.2.20060mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK2007.0\", reference:\"pdftohtml-0.36-5.1mdv2007.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:43:26", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 23, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : cups (ZYPP Patch Number 2528)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_CUPS-2528.NASL", "href": "https://www.tenable.com/plugins/nessus/29409", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29409);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"SuSE 10 Security Update : cups (ZYPP Patch Number 2528)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0104.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 2528.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"cups-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"cups-client-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"cups-devel-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"cups-libs-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, cpu:\"x86_64\", reference:\"cups-libs-32bit-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"cups-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"cups-client-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"cups-devel-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"cups-libs-1.1.23-40.12\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, cpu:\"x86_64\", reference:\"cups-libs-32bit-1.1.23-40.12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:44:16", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 24, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : gpdf (gpdf-2596)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:gpdf", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_GPDF-2596.NASL", "href": "https://www.tenable.com/plugins/nessus/27243", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update gpdf-2596.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27243);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"openSUSE 10 Security Update : gpdf (gpdf-2596)\");\n script_summary(english:\"Check for the gpdf-2596 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gpdf package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/02/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"gpdf-2.10.0-40.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"gpdf-2.10.0-82.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gpdf\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:47:22", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 24, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : xpdf (xpdf-2473)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:xpdf", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_XPDF-2473.NASL", "href": "https://www.tenable.com/plugins/nessus/27497", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update xpdf-2473.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27497);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"openSUSE 10 Security Update : xpdf (xpdf-2473)\");\n script_summary(english:\"Check for the xpdf-2473 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected xpdf package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xpdf-3.01-21.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"xpdf-3.01-58.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xpdf\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:46:23", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 24, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : libextractor (libextractor-2494)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.1", "p-cpe:/a:novell:opensuse:libextractor", "p-cpe:/a:novell:opensuse:libextractor-devel"], "id": "SUSE_LIBEXTRACTOR-2494.NASL", "href": "https://www.tenable.com/plugins/nessus/27322", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libextractor-2494.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27322);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"openSUSE 10 Security Update : libextractor (libextractor-2494)\");\n script_summary(english:\"Check for the libextractor-2494 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libextractor packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libextractor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libextractor-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"libextractor-0.5.10-12.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"libextractor-devel-0.5.10-12.5\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libextractor\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:51:40", "description": "The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\nkpdf in KDE before 3.5.5, and other products, allows remote attackers\nto have an unknown impact, possibly including denial of service\n(infinite loop), arbitrary code execution, or memory corruption, via a\nPDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\nattribute that references an invalid page tree node.\n\nThe updated packages have been patched to correct this problem.", "edition": 24, "published": "2007-02-18T00:00:00", "title": "Mandrake Linux Security Advisory : xpdf (MDKSA-2007:021)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-02-18T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2007", "p-cpe:/a:mandriva:linux:xpdf-tools", "p-cpe:/a:mandriva:linux:xpdf"], "id": "MANDRAKE_MDKSA-2007-021.NASL", "href": "https://www.tenable.com/plugins/nessus/24636", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2007:021. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(24636);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-0104\");\n script_xref(name:\"MDKSA\", value:\"2007:021\");\n\n script_name(english:\"Mandrake Linux Security Advisory : xpdf (MDKSA-2007:021)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,\nkpdf in KDE before 3.5.5, and other products, allows remote attackers\nto have an unknown impact, possibly including denial of service\n(infinite loop), arbitrary code execution, or memory corruption, via a\nPDF file with a (1) crafted catalog dictionary or (2) a crafted Pages\nattribute that references an invalid page tree node.\n\nThe updated packages have been patched to correct this problem.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xpdf and / or xpdf-tools packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:xpdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:xpdf-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/02/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", reference:\"xpdf-3.01pl2-3.1mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"xpdf-tools-3.01pl2-3.1mdv2007.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:45:21", "description": "This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)", "edition": 23, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : kdegraphics3-pdf (ZYPP Patch Number 2564)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0104"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KDEGRAPHICS3-PDF-2564.NASL", "href": "https://www.tenable.com/plugins/nessus/29479", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29479);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0104\");\n\n script_name(english:\"SuSE 10 Security Update : kdegraphics3-pdf (ZYPP Patch Number 2564)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a vulnerability which occurs while processing a\nspecial PDF file. This bug can lead to a denial-of-service condition,\nor a memory corruption, or to arbitrary code execution.\n(CVE-2007-0104)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0104.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 2564.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/02/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"kdegraphics3-pdf-3.5.1-23.13\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"kdegraphics3-pdf-3.5.1-23.13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0103", "CVE-2007-0104"], "description": "# No description provided by the source\n\n## References:\n[Secunia Advisory ID:23799](https://secuniaresearch.flexerasoftware.com/advisories/23799/)\n[Secunia Advisory ID:23876](https://secuniaresearch.flexerasoftware.com/advisories/23876/)\n[Secunia Advisory ID:23791](https://secuniaresearch.flexerasoftware.com/advisories/23791/)\n[Secunia Advisory ID:23815](https://secuniaresearch.flexerasoftware.com/advisories/23815/)\n[Secunia Advisory ID:23839](https://secuniaresearch.flexerasoftware.com/advisories/23839/)\n[Secunia Advisory ID:24148](https://secuniaresearch.flexerasoftware.com/advisories/24148/)\n[Secunia Advisory ID:23808](https://secuniaresearch.flexerasoftware.com/advisories/23808/)\n[Secunia Advisory ID:23813](https://secuniaresearch.flexerasoftware.com/advisories/23813/)\n[Secunia Advisory ID:23844](https://secuniaresearch.flexerasoftware.com/advisories/23844/)\n[Secunia Advisory ID:24204](https://secuniaresearch.flexerasoftware.com/advisories/24204/)\n[Related OSVDB ID: 32870](https://vulners.com/osvdb/OSVDB:32870)\nOther Advisory URL: http://projects.info-pull.com/moab/MOAB-06-01-2007.html\nOther Advisory URL: https://issues.rpath.com/browse/RPL-964\nOther Advisory URL: http://www.kde.org/info/security/advisory-20070115-1.txt\nOther Advisory URL: http://www.ubuntu.com/usn/usn-410-1\nOther Advisory URL: http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:024\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2007-Feb/0003.html\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:018\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:020\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:022\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0389.html\nISS X-Force ID: 31364\nFrSIRT Advisory: ADV-2007-0203\nFrSIRT Advisory: ADV-2007-0212\nFrSIRT Advisory: ADV-2007-0244\nFrSIRT Advisory: ADV-2007-0930\n[CVE-2007-0104](https://vulners.com/cve/CVE-2007-0104)\n[CVE-2007-0103](https://vulners.com/cve/CVE-2007-0103)\nBugtraq ID: 21910\n", "edition": 1, "modified": "2007-01-17T09:18:43", "published": "2007-01-17T09:18:43", "href": "https://vulners.com/osvdb/OSVDB:32871", "id": "OSVDB:32871", "title": "Multiple Product Adobe PDF Specification Invalid Tree Node DoS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0103", "CVE-2007-0104"], "description": "# No description provided by the source\n\n## References:\n[Secunia Advisory ID:23799](https://secuniaresearch.flexerasoftware.com/advisories/23799/)\n[Secunia Advisory ID:23876](https://secuniaresearch.flexerasoftware.com/advisories/23876/)\n[Secunia Advisory ID:23815](https://secuniaresearch.flexerasoftware.com/advisories/23815/)\n[Secunia Advisory ID:23791](https://secuniaresearch.flexerasoftware.com/advisories/23791/)\n[Secunia Advisory ID:23839](https://secuniaresearch.flexerasoftware.com/advisories/23839/)\n[Secunia Advisory ID:24148](https://secuniaresearch.flexerasoftware.com/advisories/24148/)\n[Secunia Advisory ID:23808](https://secuniaresearch.flexerasoftware.com/advisories/23808/)\n[Secunia Advisory ID:23813](https://secuniaresearch.flexerasoftware.com/advisories/23813/)\n[Secunia Advisory ID:23844](https://secuniaresearch.flexerasoftware.com/advisories/23844/)\n[Secunia Advisory ID:24204](https://secuniaresearch.flexerasoftware.com/advisories/24204/)\n[Related OSVDB ID: 32871](https://vulners.com/osvdb/OSVDB:32871)\nOther Advisory URL: https://issues.rpath.com/browse/RPL-964\nOther Advisory URL: http://projects.info-pull.com/moab/MOAB-06-01-2007.html\nOther Advisory URL: http://www.kde.org/info/security/advisory-20070115-1.txt\nOther Advisory URL: http://www.ubuntu.com/usn/usn-410-1\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:024\nOther Advisory URL: http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:018\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:022\nOther Advisory URL: http://www.mandriva.com/security/advisories?name=MDKSA-2007:020\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2007-Feb/0003.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0389.html\nISS X-Force ID: 31364\nFrSIRT Advisory: ADV-2007-0203\nFrSIRT Advisory: ADV-2007-0212\nFrSIRT Advisory: ADV-2007-0244\nFrSIRT Advisory: ADV-2007-0930\n[CVE-2007-0104](https://vulners.com/cve/CVE-2007-0104)\n[CVE-2007-0103](https://vulners.com/cve/CVE-2007-0103)\nBugtraq ID: 21910\n", "edition": 1, "modified": "2007-01-17T09:18:43", "published": "2007-01-17T09:18:43", "href": "https://vulners.com/osvdb/OSVDB:32870", "id": "OSVDB:32870", "title": "Multiple Product Adobe PDF Specification Malformed Catalog Dictionary DoS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "seebug": [{"lastseen": "2017-11-19T21:47:54", "description": "BUGTRAQ ID: 27740,27739\r\nCVE(CAN) ID: CVE-2007-0104,CVE-2007-0102\r\n\r\nPublisher\u662f\u5fae\u8f6fOffice\u529e\u516c\u8f6f\u4ef6\u5957\u4ef6\u4e2d\u7528\u4e8e\u521b\u5efa\u3001\u4e2a\u6027\u5316\u548c\u5171\u4eab\u5404\u79cd\u51fa\u7248\u7269\u548c\u8425\u9500\u6750\u6599\u7684\u5de5\u5177\u3002\r\n\r\nPublisher\u5728\u5c06Publisher\u6587\u4ef6\u52a0\u8f7d\u5230\u5185\u5b58\u65f6\u6ca1\u6709\u6b63\u786e\u5730\u9a8c\u8bc1\u5e94\u7528\u7a0b\u5e8f\u6570\u636e\uff0c\u5728\u6253\u5f00\u7279\u5236\u7684Publisher\u6587\u4ef6\u65f6\u6ca1\u6709\u9a8c\u8bc1\u5185\u5b58\u7d22\u5f15\u503c\u3002\u5982\u679c\u7528\u6237\u53d7\u9a97\u6253\u5f00\u4e86\u6076\u610f.pub\u6587\u4ef6\u7684\u8bdd\uff0c\u5c31\u53ef\u80fd\u89e6\u53d1\u5185\u5b58\u7834\u574f\uff0c\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u6307\u4ee4\u3002\r\n\r\n\n\nMicrosoft Publisher 2003 SP2\r\nMicrosoft Publisher 2002\r\nMicrosoft Publisher 2000\n \u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u4e0d\u8981\u6253\u5f00\u6216\u4fdd\u5b58\u4e0d\u53ef\u4fe1\u4efb\u6765\u6e90\u7684Microsoft Office\u6587\u4ef6\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS08-012\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS08-012\uff1aVulnerabilities in Microsoft Office Publisher Could Allow Remote Code Execution (947085)\r\n\u94fe\u63a5\uff1a<a href=http://www.microsoft.com/technet/security/Bulletin/MS08-012.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/MS08-012.mspx?pf=true</a>", "published": "2008-02-20T00:00:00", "title": "Microsoft Publisher\u6587\u4ef6\u89e3\u6790\u591a\u4e2a\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08MS08-012\uff09", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-0102", "CVE-2007-0104"], "modified": "2008-02-20T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-2900", "id": "SSV:2900", "sourceData": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": ""}]}