CVE-2010-3702 (CNNVD-201011-038)

HIGH
中文标题:
多个产品PDF解析器Gfx::getPos函数输入验证错误漏洞
英文标题:
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other ...
CVSS分数: 7.5
发布时间: 2010-11-05 17:00:00
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

xpdf 3.02pl5之前版本,poppler 0.8.7,0.15.1及之前的其他版本,kdegraphics及其他产品中的PDF解析器中的Gfx::getPos函数中存在输入验证漏洞。上下文攻击者可借助能够触发未初始化指针解引用的未知向量导致拒绝服务(崩溃)。

英文描述:

The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.

CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple cups * - - cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
freedesktop poppler * - - cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
xpdfreader xpdf * - - cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
xpdfreader xpdf 3.02 - - cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
fedoraproject fedora 12 - - cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
fedoraproject fedora 13 - - cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
fedoraproject fedora 14 - - cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
opensuse opensuse 11.1 - - cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
opensuse opensuse 11.2 - - cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
opensuse opensuse 11.3 - - cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
suse linux_enterprise_server 9 - - cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
suse linux_enterprise_server 10 - - cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
suse linux_enterprise_server 11 - - cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
debian debian_linux 5.0 - - cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
debian debian_linux 6.0 - - cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 5.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 5.0 - - cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 5.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
canonical ubuntu_linux 6.06 - - cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
canonical ubuntu_linux 8.04 - - cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
canonical ubuntu_linux 9.04 - - cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
canonical ubuntu_linux 9.10 - - cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
canonical ubuntu_linux 10.04 - - cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
canonical ubuntu_linux 10.10 - - cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
FEDORA-2010-16662 vendor-advisory
cve.org
访问
[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark mailing-list
cve.org
访问
FEDORA-2010-15857 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2010:0859 vendor-advisory
cve.org
访问
42357 third-party-advisory
cve.org
访问
MDVSA-2010:228 vendor-advisory
cve.org
访问
ADV-2011-0230 vdb-entry
cve.org
访问
RHSA-2010:0752 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SUSE-SR:2010:023 vendor-advisory
cve.org
访问
MDVSA-2010:230 vendor-advisory
cve.org
访问
SUSE-SR:2010:022 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2012:1201 vendor-advisory
cve.org
访问
43845 vdb-entry
cve.org
访问
MDVSA-2010:231 vendor-advisory
cve.org
访问
FEDORA-2010-16705 vendor-advisory
cve.org
访问
SSA:2010-324-01 vendor-advisory
cve.org
访问
RHSA-2010:0751 vendor-advisory
cve.org
访问
42397 third-party-advisory
cve.org
访问
42141 third-party-advisory
cve.org
访问
FEDORA-2010-15911 vendor-advisory
cve.org
访问
MDVSA-2012:144 vendor-advisory
cve.org
访问
ADV-2010-3097 vdb-entry
cve.org
访问
USN-1005-1 vendor-advisory
cve.org
访问
RHSA-2010:0749 vendor-advisory
cve.org
访问
RHSA-2010:0754 vendor-advisory
cve.org
访问
FEDORA-2010-15981 vendor-advisory
cve.org
访问
FEDORA-2010-16744 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ADV-2010-2897 vdb-entry
cve.org
访问
42691 third-party-advisory
cve.org
访问
DSA-2119 vendor-advisory
cve.org
访问
SUSE-SR:2010:024 vendor-advisory
cve.org
访问
MDVSA-2010:229 vendor-advisory
cve.org
访问
DSA-2135 vendor-advisory
cve.org
访问
RHSA-2010:0750 vendor-advisory
cve.org
访问
RHSA-2010:0755 vendor-advisory
cve.org
访问
RHSA-2010:0753 vendor-advisory
cve.org
访问
43079 third-party-advisory
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2010-11-05 17:00:00
修改时间:
2024-08-07 03:18:52
创建时间:
2025-11-11 15:33:10
更新时间:
2025-11-11 15:49:47
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2010-3702 2025-11-11 15:18:18 2025-11-11 07:33:10
NVD nvd_CVE-2010-3702 2025-11-11 14:53:27 2025-11-11 07:41:59
CNNVD cnnvd_CNNVD-201011-038 2025-11-11 15:09:11 2025-11-11 07:49:47
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:47
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-201011-038; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-201011-038
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:59
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 24; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 24
  • data_sources: ['cve'] -> ['cve', 'nvd']