Secunia Security Advisory - SCO has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system and compromise a user's system.
513c66d8975ff368602ba10ae704f708a6f63bbb7d67ebe8efe6e57e60ddbeea
TITLE:
SCO OpenServer update for xpdf
SECUNIA ADVISORY ID:
SA17277
VERIFY ADVISORY:
http://secunia.com/advisories/17277/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
SCO OpenServer 5.x
http://secunia.com/product/137/
DESCRIPTION:
SCO has issued an update for xpdf. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) on a vulnerable system and compromise a user's system.
For more information:
SA13602
SA13903
SA16374
SOLUTION:
Apply updated packages.
OpenServer 5.0.7:
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/507/VOL.000.000
91322dcd210248ba4607235cb3e09436
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/507/VOL.000.001
c846cdfce81f1487c3684ee3af046fa5
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/507/VOL.000.002
be20d0832276353840517a3315853044
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/507/VOL.000.003
748004313dcaf8827edc261ee196c035
OTHER REFERENCES:
SA13602:
http://secunia.com/advisories/13602/
SA13903:
http://secunia.com/advisories/13903/
SA16374:
http://secunia.com/advisories/16374/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------