Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5wjr-7h39-qr5r

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

Ссылки

EPSS

Процентиль: 88%
0.04225
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 18 лет назад

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

redhat
почти 18 лет назад

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

nvd
почти 18 лет назад

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.

debian
почти 18 лет назад

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in X ...

oracle-oval
больше 17 лет назад

ELSA-2007-1026: Important: poppler security update (IMPORTANT)

EPSS

Процентиль: 88%
0.04225
Низкий

Дефекты

CWE-119