CVE Database

CVE-2010-3702

Impact: Important
Public: 2010-09-24
Bugzilla: 595245: CVE-2010-3702 xpdf: uninitialized Gfx::parser pointer dereference

Details

The MITRE CVE dictionary describes this issue as:

The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.

Find out more about CVE-2010-3702 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5.8
Base Metrics: AV:A/AC:L/Au:N/C:P/I:P/A:P
Access Vector: Adjacent Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux Desktop Workstation version 5 (kdegraphics) RHSA-2010:0753 October 07, 2010
Red Hat Enterprise Linux Optional Productivity Applications version 5 (kdegraphics) RHSA-2010:0753 October 07, 2010
Red Hat Enterprise Linux version 3 (cups) RHSA-2010:0754 October 07, 2010
Red Hat Enterprise Linux version 3 (xpdf) RHSA-2010:0750 October 07, 2010
Red Hat Enterprise Linux version 4 (cups) RHSA-2010:0755 October 07, 2010
Red Hat Enterprise Linux version 4 (gpdf) RHSA-2010:0752 October 07, 2010
Red Hat Enterprise Linux version 4 (kdegraphics) RHSA-2010:0753 October 07, 2010
Red Hat Enterprise Linux version 4 (xpdf) RHSA-2010:0751 October 07, 2010
Red Hat Enterprise Linux version 5 (poppler) RHSA-2010:0749 October 07, 2010
Red Hat Enterprise Linux version 5 (tetex) RHSA-2012:1201 August 23, 2012
Red Hat Enterprise Linux version 6 (poppler) RHSA-2010:0859 November 10, 2010

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.