2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2007-5392" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20071107 Secunia Research: Xpdf \"Stream.cc\" Multiple Vulnerabilities" ,
"refsource" : "BUGTRAQ" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/archive/1/483372"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://secunia.com/secunia_research/2007-88/advisory/" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/secunia_research/2007-88/advisory/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.kde.org/info/security/advisory-20071107-1.txt" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.kde.org/info/security/advisory-20071107-1.txt"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "https://issues.rpath.com/browse/RPL-1926" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "https://issues.rpath.com/browse/RPL-1926"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1480" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2008/dsa-1480"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1509" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2008/dsa-1509"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1537" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2008/dsa-1537"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-3100" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-3031" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-3059" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-4031" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-3390" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-750" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200711-22" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200711-22.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200711-34" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200711-34.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200805-13" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200805-13.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:219" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:219"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:220" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:220"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:221" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:221"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:222" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:222"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:223" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:223"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:227" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:227"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:228" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:228"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2007:230" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1021" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1021.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1022" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1022.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1025" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1025.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1026" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1026.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1027" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1027.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1029" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1029.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1030" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2007:1024" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1024.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SSA:2007-316-01" ,
"refsource" : "SLACKWARE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SUSE-SA:2007:060" ,
"refsource" : "SUSE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/linux/security/advisories/2007_60_pdf.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-542-1" ,
"refsource" : "UBUNTU" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-542-1"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-542-2" ,
"refsource" : "UBUNTU" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-542-2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "26367" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/26367"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "oval:org.mitre.oval:def:10036" ,
"refsource" : "OVAL" ,
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-3774" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/3774"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-3775" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/3775"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-3776" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/3776"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-3779" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/3779"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-3786" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/3786"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1018905" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securitytracker.com/id?1018905"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27260" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27260"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27553" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27553"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27573" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27573"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27574" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27574"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27575" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27575"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27577" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27577"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27578" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27578"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27615" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27615"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27637" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27637"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27599" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27599"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "26503" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/26503"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27618" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27618"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27619" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27619"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27640" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27640"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27641" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27641"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27642" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27642"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27656" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27656"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27632" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27632"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27645" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27645"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27636" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27636"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27634" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27634"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27658" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27658"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27705" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27705"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27721" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27721"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27724" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27724"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27743" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27743"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "27856" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/27856"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "28043" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28043"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "28812" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28812"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "29104" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29104"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "29604" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29604"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "30168" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/30168"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "xpdf-dctstreamreset-bo(38303)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38303"
}
]
}
}