Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7x5f-fvjf-pxrp

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

Ссылки

EPSS

Процентиль: 96%
0.25469
Средний

Связанные уязвимости

ubuntu
около 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

redhat
больше 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

nvd
около 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.

debian
около 18 лет назад

Array index error in the DCTStream::readProgressiveDataUnit method in ...

oracle-oval
около 18 лет назад

ELSA-2007-1026: Important: poppler security update (IMPORTANT)

EPSS

Процентиль: 96%
0.25469
Средний