Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7x5f-fvjf-pxrp

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

Ссылки

EPSS

Процентиль: 95%
0.18813
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

redhat
почти 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

nvd
почти 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

debian
почти 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in ...

oracle-oval
больше 17 лет назад

ELSA-2007-1026: Important: poppler security update (IMPORTANT)

EPSS

Процентиль: 95%
0.18813
Средний