CVE-2010-3702 (CNNVD-201011-038)
HIGH
中文标题:
多个产品PDF解析器Gfx::getPos函数输入验证错误漏洞
英文标题:
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other ...
CVSS分数:
7.5
发布时间:
2010-11-05 17:00:00
漏洞类型:
代码问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
xpdf 3.02pl5之前版本,poppler 0.8.7,0.15.1及之前的其他版本,kdegraphics及其他产品中的PDF解析器中的Gfx::getPos函数中存在输入验证漏洞。上下文攻击者可借助能够触发未初始化指针解引用的未知向量导致拒绝服务(崩溃)。
英文描述:
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apple | cups | * | - | - |
cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
|
| freedesktop | poppler | * | - | - |
cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
|
| xpdfreader | xpdf | * | - | - |
cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
|
| xpdfreader | xpdf | 3.02 | - | - |
cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
|
| fedoraproject | fedora | 12 | - | - |
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 13 | - | - |
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 14 | - | - |
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.1 | - | - |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.2 | - | - |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.3 | - | - |
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 9 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
|
| suse | linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 6.0 | - | - |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 5.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 6.06 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 9.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 10.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
FEDORA-2010-16662
vendor-advisory
cve.org
访问
cve.org
[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark
mailing-list
cve.org
访问
cve.org
FEDORA-2010-15857
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
RHSA-2010:0859
vendor-advisory
cve.org
访问
cve.org
42357
third-party-advisory
cve.org
访问
cve.org
MDVSA-2010:228
vendor-advisory
cve.org
访问
cve.org
ADV-2011-0230
vdb-entry
cve.org
访问
cve.org
RHSA-2010:0752
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
SUSE-SR:2010:023
vendor-advisory
cve.org
访问
cve.org
MDVSA-2010:230
vendor-advisory
cve.org
访问
cve.org
SUSE-SR:2010:022
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2012:1201
vendor-advisory
cve.org
访问
cve.org
43845
vdb-entry
cve.org
访问
cve.org
MDVSA-2010:231
vendor-advisory
cve.org
访问
cve.org
FEDORA-2010-16705
vendor-advisory
cve.org
访问
cve.org
SSA:2010-324-01
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0751
vendor-advisory
cve.org
访问
cve.org
42397
third-party-advisory
cve.org
访问
cve.org
42141
third-party-advisory
cve.org
访问
cve.org
FEDORA-2010-15911
vendor-advisory
cve.org
访问
cve.org
MDVSA-2012:144
vendor-advisory
cve.org
访问
cve.org
ADV-2010-3097
vdb-entry
cve.org
访问
cve.org
USN-1005-1
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0749
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0754
vendor-advisory
cve.org
访问
cve.org
FEDORA-2010-15981
vendor-advisory
cve.org
访问
cve.org
FEDORA-2010-16744
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
ADV-2010-2897
vdb-entry
cve.org
访问
cve.org
42691
third-party-advisory
cve.org
访问
cve.org
DSA-2119
vendor-advisory
cve.org
访问
cve.org
SUSE-SR:2010:024
vendor-advisory
cve.org
访问
cve.org
MDVSA-2010:229
vendor-advisory
cve.org
访问
cve.org
DSA-2135
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0750
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0755
vendor-advisory
cve.org
访问
cve.org
RHSA-2010:0753
vendor-advisory
cve.org
访问
cve.org
43079
third-party-advisory
cve.org
访问
cve.org
CVSS评分详情
7.5
HIGH
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2010-11-05 17:00:00
修改时间:
2024-08-07 03:18:52
创建时间:
2025-11-11 15:33:10
更新时间:
2025-11-11 15:49:47
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2010-3702 |
2025-11-11 15:18:18 | 2025-11-11 07:33:10 |
| NVD | nvd_CVE-2010-3702 |
2025-11-11 14:53:27 | 2025-11-11 07:41:59 |
| CNNVD | cnnvd_CNNVD-201011-038 |
2025-11-11 15:09:11 | 2025-11-11 07:49:47 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:47
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-201011-038; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-201011-038
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:59
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 24; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']