VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 2) [ Download XML
CVE-2010-3702
poppler, kdegraphics, xpdf: The Gfx::getPos function in the PDF parser in xpdf ...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3702

Original

The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-05
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-09




Affected Product Tags
cpe:/a:foolabs:xpdf:0.2
cpe:/a:foolabs:xpdf:0.3
cpe:/a:foolabs:xpdf:0.4
cpe:/a:foolabs:xpdf:0.5
cpe:/a:foolabs:xpdf:0.5a
cpe:/a:foolabs:xpdf:0.6
cpe:/a:foolabs:xpdf:0.7
cpe:/a:foolabs:xpdf:0.7a
cpe:/a:foolabs:xpdf:0.80
cpe:/a:foolabs:xpdf:0.90
cpe:/a:foolabs:xpdf:0.91
cpe:/a:foolabs:xpdf:0.91a
cpe:/a:foolabs:xpdf:0.91b
cpe:/a:foolabs:xpdf:0.91c
cpe:/a:foolabs:xpdf:0.92
cpe:/a:foolabs:xpdf:0.92a
cpe:/a:foolabs:xpdf:0.92b
cpe:/a:foolabs:xpdf:0.92c
cpe:/a:foolabs:xpdf:0.92d
cpe:/a:foolabs:xpdf:0.92e
cpe:/a:foolabs:xpdf:0.93
cpe:/a:foolabs:xpdf:0.93a
cpe:/a:foolabs:xpdf:0.93b
cpe:/a:foolabs:xpdf:0.93c
cpe:/a:foolabs:xpdf:1.00
cpe:/a:foolabs:xpdf:1.00a
cpe:/a:foolabs:xpdf:1.01
cpe:/a:foolabs:xpdf:2.00
cpe:/a:foolabs:xpdf:2.01
cpe:/a:foolabs:xpdf:2.02
cpe:/a:foolabs:xpdf:2.03
cpe:/a:foolabs:xpdf:3.0.1
cpe:/a:foolabs:xpdf:3.00
cpe:/a:foolabs:xpdf:3.01
cpe:/a:foolabs:xpdf:3.02
cpe:/a:foolabs:xpdf:3.02pl1
cpe:/a:foolabs:xpdf:3.02pl2
cpe:/a:foolabs:xpdf:3.02pl3
cpe:/a:foolabs:xpdf:3.02pl4 and previous versions
cpe:/a:kde:kdegraphics
cpe:/a:poppler:poppler:0.10.0
cpe:/a:poppler:poppler:0.10.1
cpe:/a:poppler:poppler:0.10.2
cpe:/a:poppler:poppler:0.10.3
cpe:/a:poppler:poppler:0.10.4
cpe:/a:poppler:poppler:0.10.5
cpe:/a:poppler:poppler:0.10.6
cpe:/a:poppler:poppler:0.10.7
cpe:/a:poppler:poppler:0.11.0
cpe:/a:poppler:poppler:0.11.1
cpe:/a:poppler:poppler:0.11.2
cpe:/a:poppler:poppler:0.11.3
cpe:/a:poppler:poppler:0.12.0
cpe:/a:poppler:poppler:0.12.1
cpe:/a:poppler:poppler:0.12.2
cpe:/a:poppler:poppler:0.12.3
cpe:/a:poppler:poppler:0.12.4
cpe:/a:poppler:poppler:0.13.0
cpe:/a:poppler:poppler:0.13.1
cpe:/a:poppler:poppler:0.13.2
cpe:/a:poppler:poppler:0.13.3
cpe:/a:poppler:poppler:0.13.4
cpe:/a:poppler:poppler:0.14.0
cpe:/a:poppler:poppler:0.14.1
cpe:/a:poppler:poppler:0.14.2
cpe:/a:poppler:poppler:0.14.3
cpe:/a:poppler:poppler:0.14.4
cpe:/a:poppler:poppler:0.14.5
cpe:/a:poppler:poppler:0.15.0
cpe:/a:poppler:poppler:0.15.1
cpe:/a:poppler:poppler:0.8.7
cpe:/a:poppler:poppler:0.9.0
cpe:/a:poppler:poppler:0.9.1
cpe:/a:poppler:poppler:0.9.2
cpe:/a:poppler:poppler:0.9.3
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 43845




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=595245




CONFIRM ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch




DEBIAN DSA-2119




FEDORA FEDORA-2010-15981




FEDORA FEDORA-2010-15911




FEDORA FEDORA-2010-15857




MISC http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf




REDHAT RHSA-2010:0753




REDHAT RHSA-2010:0752




REDHAT RHSA-2010:0751




REDHAT RHSA-2010:0750




REDHAT RHSA-2010:0749




UBUNTU USN-1005-1




Vulnerability Type Input Validation (CWE-20)





Copyright © 2010 JPCERT/CC All Rights Reserved.