VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-3704
kdegraphics, xpdf, poppler: The FoFiType1::parse function in fofi/FoFiType1.cc ...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3704

Original

The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-05
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-08




Affected Product Tags
cpe:/a:kde:kdegraphics
cpe:/a:poppler:poppler:0.10.0
cpe:/a:poppler:poppler:0.10.1
cpe:/a:poppler:poppler:0.10.2
cpe:/a:poppler:poppler:0.10.3
cpe:/a:poppler:poppler:0.10.4
cpe:/a:poppler:poppler:0.10.5
cpe:/a:poppler:poppler:0.10.6
cpe:/a:poppler:poppler:0.10.7
cpe:/a:poppler:poppler:0.11.0
cpe:/a:poppler:poppler:0.11.1
cpe:/a:poppler:poppler:0.11.2
cpe:/a:poppler:poppler:0.11.3
cpe:/a:poppler:poppler:0.12.0
cpe:/a:poppler:poppler:0.12.1
cpe:/a:poppler:poppler:0.12.2
cpe:/a:poppler:poppler:0.12.3
cpe:/a:poppler:poppler:0.12.4
cpe:/a:poppler:poppler:0.13.0
cpe:/a:poppler:poppler:0.13.1
cpe:/a:poppler:poppler:0.13.2
cpe:/a:poppler:poppler:0.13.3
cpe:/a:poppler:poppler:0.13.4
cpe:/a:poppler:poppler:0.14.0
cpe:/a:poppler:poppler:0.14.1
cpe:/a:poppler:poppler:0.14.2
cpe:/a:poppler:poppler:0.14.3
cpe:/a:poppler:poppler:0.14.4
cpe:/a:poppler:poppler:0.14.5
cpe:/a:poppler:poppler:0.15.0
cpe:/a:poppler:poppler:0.8.7
cpe:/a:poppler:poppler:0.9.0
cpe:/a:poppler:poppler:0.9.1
cpe:/a:poppler:poppler:0.9.2
cpe:/a:poppler:poppler:0.9.3
cpe:/a:xpdf:xpdf:0.2
cpe:/a:xpdf:xpdf:0.3
cpe:/a:xpdf:xpdf:0.4
cpe:/a:xpdf:xpdf:0.5
cpe:/a:xpdf:xpdf:0.5a
cpe:/a:xpdf:xpdf:0.6
cpe:/a:xpdf:xpdf:0.7
cpe:/a:xpdf:xpdf:0.7a
cpe:/a:xpdf:xpdf:0.80
cpe:/a:xpdf:xpdf:0.90
cpe:/a:xpdf:xpdf:0.91
cpe:/a:xpdf:xpdf:0.91a
cpe:/a:xpdf:xpdf:0.91b
cpe:/a:xpdf:xpdf:0.91c
cpe:/a:xpdf:xpdf:0.92
cpe:/a:xpdf:xpdf:0.92a
cpe:/a:xpdf:xpdf:0.92b
cpe:/a:xpdf:xpdf:0.92c
cpe:/a:xpdf:xpdf:0.92d
cpe:/a:xpdf:xpdf:0.92e
cpe:/a:xpdf:xpdf:0.93
cpe:/a:xpdf:xpdf:0.93a
cpe:/a:xpdf:xpdf:0.93b
cpe:/a:xpdf:xpdf:0.93c
cpe:/a:xpdf:xpdf:1.0
cpe:/a:xpdf:xpdf:1.0a
cpe:/a:xpdf:xpdf:1.1
cpe:/a:xpdf:xpdf:2.0
cpe:/a:xpdf:xpdf:2.1
cpe:/a:xpdf:xpdf:2.2
cpe:/a:xpdf:xpdf:2.3
cpe:/a:xpdf:xpdf:3.0
cpe:/a:xpdf:xpdf:3.0.0
cpe:/a:xpdf:xpdf:3.0.1
cpe:/a:xpdf:xpdf:3.0.1_pl1
cpe:/a:xpdf:xpdf:3.0.1_pl2
cpe:/a:xpdf:xpdf:3.02
cpe:/a:xpdf:xpdf:3.02_pl2
cpe:/a:xpdf:xpdf:3.0_pl2
cpe:/a:xpdf:xpdf:3.0_pl3
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473




CONFIRM ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=638960




DEBIAN DSA-2119




FEDORA FEDORA-2010-15981




FEDORA FEDORA-2010-15911




FEDORA FEDORA-2010-15857




REDHAT RHSA-2010:0753




REDHAT RHSA-2010:0752




REDHAT RHSA-2010:0751




REDHAT RHSA-2010:0749




UBUNTU USN-1005-1




Vulnerability Type Input Validation (CWE-20)





Copyright © 2010 JPCERT/CC All Rights Reserved.