Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-3387

Опубликовано: 30 июл. 2007
Источник: debian
EPSS Средний

Описание

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
popplerfixed0.5.4-6.1package
gpdfremovedpackage
xpdffixed3.02-1.1package
kdegraphicsfixed4:3.5.7-3package
kofficefixed1:1.6.3-2package
pdftohtmlremovedpackage
pdftohtmlfixed0.36-13etch1etchpackage
tetex-binfixed3.0-12package
cupsysnot-affectedpackage
cupsnot-affectedpackage
pdfkit.frameworkfixed0.8-4package
libextractorfixed0.5.12-1package
ipenot-affectedpackage
swftoolsfixed0.9.2+ds1-2package

Примечания

  • pdftex links to poppler since 3.0-12, thus marking as fixed

  • cups uses xpdf-utils

  • links to poppler since 0.8-4, thus marking as fixed

  • libextractor uses internal pdf decoder since 0.5.12-1, thus marking as fixed

EPSS

Процентиль: 93%
0.11401
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

redhat
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

nvd
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

github
около 3 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

oracle-oval
почти 18 лет назад

ELSA-2007-0732: Important: poppler security update (IMPORTANT)

EPSS

Процентиль: 93%
0.11401
Средний