Описание
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
poppler | fixed | 0.6.2-1 | package | |
kdegraphics | fixed | 4:3.5.8-2 | package | |
kdegraphics | not-affected | etch | package | |
xpdf | fixed | 3.02-1.3 | package | |
koffice | fixed | 1:1.6.3-4 | package | |
cupsys | fixed | 1.1.22-7 | package | |
cups | fixed | 1.1.22-7 | package | |
gpdf | removed | package | ||
pdftohtml | removed | package | ||
pdftohtml | fixed | 0.36-13etch1 | etch | package |
tetex-bin | fixed | 3.0-12 | package | |
libextractor | fixed | 0.5.12-1 | package | |
swftools | fixed | 0.9.2+ds1-2 | package |
Примечания
pdftex links to poppler since 3.0-12, thus marking as fixed
cups uses xpdf-utils and poppler-utils since version 1.1.22-7
libextractor uses internal pdf decoder since 0.5.12-1, thus marking as fixed
EPSS
Связанные уязвимости
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
ELSA-2007-1026: Important: poppler security update (IMPORTANT)
EPSS