[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:228 -- Mandriva xpdf

ID: oval:org.secpod.oval:def:300019Date: (C)2012-01-07   (M)2021-09-11
Class: PATCHFamily: unix




Multiple vulnerabilities were discovered and corrected in xpdf: The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, allows context-dependent attackers to cause a denial of service via unknown vectors that trigger an uninitialized pointer dereference . The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a PDF file with a crafted Type1 font that contains a negative array index, which bypasses input validation and which triggers memory corruption . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2009.0
Product:
xpdf
Reference:
MDVSA-2010:228
CVE-2010-3704
CVE-2010-3702
CVE    2
CVE-2010-3704
CVE-2010-3702
CPE    1
cpe:/o:mandriva:linux:2009.0

© SecPod Technologies