Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2010-3704
Description:The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context- dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
Test IDs: 1.3.6.1.4.1.25623.1.0.68436   1.3.6.1.4.1.25623.1.0.68385   1.3.6.1.4.1.25623.1.0.68387   1.3.6.1.4.1.25623.1.0.68442   1.3.6.1.4.1.25623.1.0.68390   1.3.6.1.4.1.25623.1.0.68440  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2010-3704
BugTraq ID: 43841
http://www.securityfocus.com/bid/43841
Debian Security Information: DSA-2119 (Google Search)
http://www.debian.org/security/2010/dsa-2119
Debian Security Information: DSA-2135 (Google Search)
http://www.debian.org/security/2010/dsa-2135
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
http://www.openwall.com/lists/oss-security/2010/10/04/6
RedHat Security Advisories: RHSA-2010:0749
http://www.redhat.com/support/errata/RHSA-2010-0749.html
RedHat Security Advisories: RHSA-2010:0751
http://www.redhat.com/support/errata/RHSA-2010-0751.html
RedHat Security Advisories: RHSA-2010:0752
http://www.redhat.com/support/errata/RHSA-2010-0752.html
RedHat Security Advisories: RHSA-2010:0753
http://www.redhat.com/support/errata/RHSA-2010-0753.html
RedHat Security Advisories: RHSA-2010:0859
http://www.redhat.com/support/errata/RHSA-2010-0859.html
RedHat Security Advisories: RHSA-2012:1201
http://rhn.redhat.com/errata/RHSA-2012-1201.html
http://secunia.com/advisories/42141
http://secunia.com/advisories/42357
http://secunia.com/advisories/42397
http://secunia.com/advisories/42691
http://secunia.com/advisories/43079
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
SuSE Security Announcement: SUSE-SR:2010:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
SuSE Security Announcement: SUSE-SR:2010:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
http://www.ubuntu.com/usn/USN-1005-1
http://www.vupen.com/english/advisories/2010/2897
http://www.vupen.com/english/advisories/2010/3097
http://www.vupen.com/english/advisories/2011/0230




© 1998-2024 E-Soft Inc. All rights reserved.