CVE-2010-4654
https://notcve.org/view.php?id=CVE-2010-4654
poppler before 0.16.3 has malformed commands that may cause corruption of the internal stack. poppler versiones anteriores a la versión 0.16.3, tiene comandos malformados que pueden corromper la pila interna. • http://security.gentoo.org/glsa/glsa-201310-03.xml https://access.redhat.com/security/cve/cve-2010-4654 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654 https://security-tracker.debian.org/tracker/CVE-2010-4654 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2012-2142
https://notcve.org/view.php?id=CVE-2012-2142
The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator. La función error en el archivo Error.cc en poppler versiones anteriores a 0.21.4, permite a atacantes remotos ejecutar comandos arbitrarios por medio de un PDF que contiene una secuencia de escape para un emulador terminal. • http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40 http://cgit.freedesktop.org/poppler/poppler/commit/NEWS?id=2bc48d5369f1dbecfc4db2878f33bdeb80d8d90f http://lists.opensuse.org/opensuse-updates/2013-08/msg00049.html http://www.openwall.com/lists/oss-security/2013/08/09/5 http://www.openwall.com/lists/oss-security/2013/08/09/6 https://bugzilla.redhat.com/show_bug.cgi?id=789936 •
CVE-2013-1789
https://notcve.org/view.php?id=CVE-2013-1789
splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. splash/Splash.cc en poppler anterior a v0.22.1 permite a atacantes dependientes de contexto provocar una denegación de servicio (referencia NULL y caída de la aplicación) a través de vectores relacionados con las funciones (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, y (3) Splash::scaleMaskYuXu. • http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 http://j00ru.vexillium.org/?p=1507 http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html http://secunia.com/advisories/52846 http://ubuntu.com/usn/usn-1785-1 http://www.openwall.com •
CVE-2013-1788
https://notcve.org/view.php?id=CVE-2013-1788
poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. poppler anterior a v0.22.1 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) y, posiblemente, ejecutar código de su elección a través de vectores que disparan un "acceso de memoria invalida" en (1) splash/Splash.cc, (2) poppler/Function.cc, y (3) poppler/Stream.cc. • http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696 http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959 http://cgit.freedesktop.org/poppler/poppler/commit/? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-1790
https://notcve.org/view.php?id=CVE-2013-1790
poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. poppler/Stream.cc en poppler anterior a 0.22.1 permite a atacantes dependientes de contexto tener un impacto no especificado a través de vectores que provocan una lectura de memoria no inicializada por la función CCITTFaxStream::lookChar • http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 http://j00ru.vexillium.org/?p=1507 http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html http://secunia.com/advisories/52846 http://ubuntu.com/usn/usn-1785-1 http://www.debian.org/security/2013/dsa-2719 http://www.mandriva.com/security/advisories?name=MDVSA-2013:143 http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •