Page 5 of 47 results (0.021 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp. Se ha detectado que el commit ffaf11c de XPDF contenía un desbordamiento de pila por medio de la función __asan_memcpy en el archivo asan_interceptors_memintrinsics.cpp. • https://github.com/jhcloos/xpdf/issues/4 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow. La función FoFiType1::parse en fofi/FoFiType1.cc en Xpdf v3.0.0, en gpdf v2.8.2, en kpdf en kdegraphics v3.3.1, y posiblemente otras liberías y versiones, no verifica el valor de retorno de la función getNextLine, permite a los atacantes dependientes del contexto ejecutar código de su elección mediante un fichero PDF con una fuente Type 1 modificada que puede producir un valor negativo, conduciendo a un error de conversión de entero signed-to-unsigned y un desbordamiento de búfer. • http://cgit.freedesktop.org/poppler/poppler/diff/fofi/FoFiType1.cc?id=4b4fc5c0 http://cgit.freedesktop.org/poppler/poppler/tree/fofi/FoFiType1.cc?id=4b4fc5c017bf147c9069bbce32fc14467bd2a81a http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html http://secunia.com/advisories/37641 http://secunia.com/advisories/37781 http://secunia.com/advisories/37787 http://secunia.com/advisories/37793 http://www.redhat.com/support/errata/RHSA-2009-1680.html http://www.redhat.com/support/errata&# • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 15%CPEs: 1EXPL: 0

Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow. Un desbordamiento de enteros en el método DCTStream::reset en el archivo xpdf/Stream.cc en Xpdf versión 3.02p11, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo PDF diseñado, resultando en un desbordamiento de búfer en la región heap de la memoria. • http://secunia.com/advisories/26503 http://secunia.com/advisories/27260 http://secunia.com/advisories/27553 http://secunia.com/advisories/27573 http://secunia.com/advisories/27574 http://secunia.com/advisories/27575 http://secunia.com/advisories/27577 http://secunia.com/advisories/27578 http://secunia.com/advisories/27599 http://secunia.com/advisories/27615 http://secunia.com/advisories/27618 http://secunia.com/advisories/27619 http://secunia.com/advisories/27632 http:/& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 17%CPEs: 1EXPL: 0

Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file. Un error de índice de matriz en el método DCTStream::readProgressiveDataUnit en el archivo xpdf/Stream.cc en Xpdf versión 3.02pl1, tal y como es usado en poppler, teTeX, KDE, KOffice, CUPS y otros productos, permite a atacantes remotos desencadenar corrupción de memoria y ejecutar código arbitrario por medio de un archivo PDF diseñado. • http://secunia.com/advisories/26503 http://secunia.com/advisories/27260 http://secunia.com/advisories/27553 http://secunia.com/advisories/27573 http://secunia.com/advisories/27574 http://secunia.com/advisories/27575 http://secunia.com/advisories/27577 http://secunia.com/advisories/27578 http://secunia.com/advisories/27599 http://secunia.com/advisories/27615 http://secunia.com/advisories/27618 http://secunia.com/advisories/27619 http://secunia.com/advisories/27632 http:/& •

CVSS: 9.3EPSS: 35%CPEs: 1EXPL: 0

Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter. Un desbordamiento de búfer en la región heap de la memoria en el método CCITTFaxStream::lookChar en el archivo xpdf/Stream.cc en Xpdf versión 3.02p11, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo PDF que contiene un filtro CCITTFaxDecode diseñado. • http://secunia.com/advisories/26503 http://secunia.com/advisories/27260 http://secunia.com/advisories/27553 http://secunia.com/advisories/27573 http://secunia.com/advisories/27574 http://secunia.com/advisories/27575 http://secunia.com/advisories/27577 http://secunia.com/advisories/27578 http://secunia.com/advisories/27579 http://secunia.com/advisories/27599 http://secunia.com/advisories/27615 http://secunia.com/advisories/27618 http://secunia.com/advisories/27619 http:/& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •