Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0732

Опубликовано: 30 июл. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0732: Important: poppler security update (IMPORTANT)

[0.5.4-4.1]

  • Add patch to fix CVE-2007-3387 (#248212).

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

poppler

0.5.4-4.1.el5

poppler-devel

0.5.4-4.1.el5

poppler-utils

0.5.4-4.1.el5

Oracle Linux i386

poppler

0.5.4-4.1.el5

poppler-devel

0.5.4-4.1.el5

poppler-utils

0.5.4-4.1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

redhat
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

nvd
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

debian
почти 18 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in x ...

github
около 3 лет назад

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.