{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2010-3702", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "name" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf", "refsource" : "MISC", "url" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "name" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "refsource" : "CONFIRM", "url" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=595245", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "name" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "refsource" : "CONFIRM", "url" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "name" : "DSA-2119", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2010/dsa-2119" }, { "name" : "DSA-2135", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2010/dsa-2135" }, { "name" : "FEDORA-2010-15857", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "name" : "FEDORA-2010-15911", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "name" : "FEDORA-2010-15981", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "name" : "FEDORA-2010-16662", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "name" : "FEDORA-2010-16705", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "name" : "FEDORA-2010-16744", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "name" : "MDVSA-2010:228", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "name" : "MDVSA-2010:229", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "name" : "MDVSA-2010:230", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "name" : "MDVSA-2010:231", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "name" : "MDVSA-2012:144", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "name" : "RHSA-2010:0749", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "name" : "RHSA-2010:0750", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "name" : "RHSA-2010:0751", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "name" : "RHSA-2010:0752", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "name" : "RHSA-2010:0753", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "name" : "RHSA-2010:0754", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "name" : "RHSA-2010:0755", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "name" : "RHSA-2010:0859", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "name" : "RHSA-2012:1201", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name" : "SSA:2010-324-01", "refsource" : "SLACKWARE", "url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "name" : "SUSE-SR:2010:022", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "name" : "SUSE-SR:2010:023", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name" : "SUSE-SR:2010:024", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name" : "USN-1005-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/USN-1005-1" }, { "name" : "43845", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/43845" }, { "name" : "42141", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42141" }, { "name" : "42397", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42397" }, { "name" : "42357", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42357" }, { "name" : "42691", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42691" }, { "name" : "43079", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/43079" }, { "name" : "ADV-2010-2897", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/2897" }, { "name" : "ADV-2010-3097", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/3097" }, { "name" : "ADV-2011-0230", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2011/0230" } ] } }