CVE-2011-1552
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
31/03/2011
Last modified:
11/04/2025
Description
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:* | 5.1.2 (including) | |
cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2012-1201.html
- http://secunia.com/advisories/43823
- http://secunia.com/advisories/48985
- http://securityreason.com/securityalert/8171
- http://securitytracker.com/id?1025266=
- http://www.foolabs.com/xpdf/download.html
- http://www.kb.cert.org/vuls/id/376500
- http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A144
- http://www.securityfocus.com/archive/1/517205/100/0/threaded
- http://www.toucan-system.com/advisories/tssa-2011-01.txt
- http://www.vupen.com/english/advisories/2011/0728
- https://security.gentoo.org/glsa/201701-57
- http://rhn.redhat.com/errata/RHSA-2012-1201.html
- http://secunia.com/advisories/43823
- http://secunia.com/advisories/48985
- http://securityreason.com/securityalert/8171
- http://securitytracker.com/id?1025266=
- http://www.foolabs.com/xpdf/download.html
- http://www.kb.cert.org/vuls/id/376500
- http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A144
- http://www.securityfocus.com/archive/1/517205/100/0/threaded
- http://www.toucan-system.com/advisories/tssa-2011-01.txt
- http://www.vupen.com/english/advisories/2011/0728
- https://security.gentoo.org/glsa/201701-57