Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-1790

Опубликовано: 09 янв. 2013
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5popplerWill not fix
Red Hat Enterprise Linux 6popplerWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=917111poppler: uninitialized memory read flaw

EPSS

Процентиль: 86%
0.02981
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.

nvd
почти 13 лет назад

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.

debian
почти 13 лет назад

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent at ...

github
больше 3 лет назад

poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.

EPSS

Процентиль: 86%
0.02981
Низкий

4.3 Medium

CVSS2