{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2011-1553", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20110327 TSSA-2011-01 xpdf : multiple vulnerabilities allow remote code execution", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/517205/100/0/threaded" }, { "name" : "http://www.toucan-system.com/advisories/tssa-2011-01.txt", "refsource" : "MISC", "url" : "http://www.toucan-system.com/advisories/tssa-2011-01.txt" }, { "name" : "http://www.foolabs.com/xpdf/download.html", "refsource" : "CONFIRM", "url" : "http://www.foolabs.com/xpdf/download.html" }, { "name" : "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X", "refsource" : "CONFIRM", "url" : "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X" }, { "name" : "GLSA-201701-57", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201701-57" }, { "name" : "MDVSA-2012:144", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "name" : "RHSA-2012:1201", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name" : "VU#376500", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/376500" }, { "name" : "1025266", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1025266" }, { "name" : "43823", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/43823" }, { "name" : "48985", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48985" }, { "name" : "8171", "refsource" : "SREASON", "url" : "http://securityreason.com/securityalert/8171" }, { "name" : "ADV-2011-0728", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2011/0728" } ] } }