6.8
CVSSv2

CVE-2007-0104

Published: 09/01/2007 Updated: 16/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE prior to 3.5.5, (c) poppler prior to 0.5.4, and other products, allows remote malicious users to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.

Vulnerable Product Search on Vulmon Subscribe to Product

xpdf xpdf 3.0_pl2

xpdf xpdf 3.0

xpdf xpdf 3.0.1

xpdf xpdf 3.0.1_pl1

xpdf xpdf 3.0.1_pl2

kde kde 3.2

kde kde 3.4

kde kde 3.4.1

kde kde 3.2.3

kde kde 3.3

kde kde 3.5

kde kde 3.2.1

kde kde 3.2.2

kde kde 3.4.2

kde kde 3.4.3

kde kde 3.3.1

kde kde 3.3.2

Vendor Advisories

Debian Bug report logs - #406852 xpdf: CVE-2007-0104 rogue Pages setting or catalog dictionary security hole Package: xpdf; Maintainer for xpdf is Debian QA Group <packages@qadebianorg>; Source for xpdf is src:xpdf (PTS, buildd, popcon) Reported by: dwkenned@comcastnet (David Kennedy) Date: Sun, 14 Jan 2007 16:33:03 UTC ...
The poppler PDF loader library did not limit the recursion depth of the page model tree By tricking a user into opening a specially crafter PDF file, this could be exploited to trigger an infinite loop and eventually crash an application that uses this library ...
USN-410-1 fixed vulnerabilities in the poppler PDF loader library This update provides the corresponding updates for a copy of this code in tetex-bin in Ubuntu 510 Versions of tetex-bin after Ubuntu 510 use poppler directly and do not need a separate update ...

References

CWE-20http://www.securityfocus.com/bid/21910http://projects.info-pull.com/moab/MOAB-06-01-2007.htmlhttp://www.kde.org/info/security/advisory-20070115-1.txthttps://issues.rpath.com/browse/RPL-964http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.htmlhttp://docs.info.apple.com/article.html?artnum=305214http://www.mandriva.com/security/advisories?name=MDKSA-2007:018http://www.mandriva.com/security/advisories?name=MDKSA-2007:020http://www.mandriva.com/security/advisories?name=MDKSA-2007:022http://www.novell.com/linux/security/advisories/2007_3_sr.htmlhttp://www.ubuntu.com/usn/usn-410-1http://www.ubuntu.com/usn/usn-410-2http://securitytracker.com/id?1017514http://www.securitytracker.com/id?1017749http://secunia.com/advisories/23799http://secunia.com/advisories/23791http://secunia.com/advisories/23808http://secunia.com/advisories/23813http://secunia.com/advisories/23815http://secunia.com/advisories/23844http://secunia.com/advisories/23839http://secunia.com/advisories/23876http://secunia.com/advisories/24204http://secunia.com/advisories/24479http://www.mandriva.com/security/advisories?name=MDKSA-2007:019http://www.mandriva.com/security/advisories?name=MDKSA-2007:021http://www.mandriva.com/security/advisories?name=MDKSA-2007:024http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlhttp://www.vupen.com/english/advisories/2007/0212http://www.vupen.com/english/advisories/2007/0930http://www.vupen.com/english/advisories/2007/0203http://www.vupen.com/english/advisories/2007/0244https://exchange.xforce.ibmcloud.com/vulnerabilities/31364http://www.securityfocus.com/archive/1/457055/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852https://usn.ubuntu.com/410-1/https://nvd.nist.gov