Vulnerabilidad en función Gfx::getPos en el analizador PDF en Xpdf, Poppler, CUPS, kdegraphics, y posiblemente otros productos (CVE-2010-3702)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
05/11/2010
Última modificación:
11/04/2025
Descripción
La función Gfx::getPos en el analizador PDF en Xpdf versión anterior a 3.02 PL5, Poppler versión 0.8.7 y posiblemente otras versiones hasta la 0.15.1, CUPS, kdegraphics, y posiblemente otros productos permite que los atacantes dependiendo del contexto generen una denegación de servicio (bloqueo) por medio de vectores desconocidos que desencadenan una desreferencia de puntero no inicializada.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* | 1.3.11 (incluyendo) | |
| cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:* | 0.8.7 (incluyendo) | 0.15.1 (incluyendo) |
| cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:* | 3.01 (incluyendo) | |
| cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
- http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://rhn.redhat.com/errata/RHSA-2012-1201.html
- http://secunia.com/advisories/42141
- http://secunia.com/advisories/42357
- http://secunia.com/advisories/42397
- http://secunia.com/advisories/42691
- http://secunia.com/advisories/43079
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
- http://www.debian.org/security/2010/dsa-2119
- http://www.debian.org/security/2010/dsa-2135
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A228
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A229
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A230
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A231
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A144
- http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
- http://www.openwall.com/lists/oss-security/2010/10/04/6
- http://www.redhat.com/support/errata/RHSA-2010-0749.html
- http://www.redhat.com/support/errata/RHSA-2010-0750.html
- http://www.redhat.com/support/errata/RHSA-2010-0751.html
- http://www.redhat.com/support/errata/RHSA-2010-0752.html
- http://www.redhat.com/support/errata/RHSA-2010-0753.html
- http://www.redhat.com/support/errata/RHSA-2010-0754.html
- http://www.redhat.com/support/errata/RHSA-2010-0755.html
- http://www.redhat.com/support/errata/RHSA-2010-0859.html
- http://www.securityfocus.com/bid/43845
- http://www.ubuntu.com/usn/USN-1005-1
- http://www.vupen.com/english/advisories/2010/2897
- http://www.vupen.com/english/advisories/2010/3097
- http://www.vupen.com/english/advisories/2011/0230
- https://bugzilla.redhat.com/show_bug.cgi?id=595245
- ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
- http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://rhn.redhat.com/errata/RHSA-2012-1201.html
- http://secunia.com/advisories/42141
- http://secunia.com/advisories/42357
- http://secunia.com/advisories/42397
- http://secunia.com/advisories/42691
- http://secunia.com/advisories/43079
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
- http://www.debian.org/security/2010/dsa-2119
- http://www.debian.org/security/2010/dsa-2135
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A228
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A229
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A230
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A231
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A144
- http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
- http://www.openwall.com/lists/oss-security/2010/10/04/6
- http://www.redhat.com/support/errata/RHSA-2010-0749.html
- http://www.redhat.com/support/errata/RHSA-2010-0750.html
- http://www.redhat.com/support/errata/RHSA-2010-0751.html
- http://www.redhat.com/support/errata/RHSA-2010-0752.html
- http://www.redhat.com/support/errata/RHSA-2010-0753.html
- http://www.redhat.com/support/errata/RHSA-2010-0754.html
- http://www.redhat.com/support/errata/RHSA-2010-0755.html
- http://www.redhat.com/support/errata/RHSA-2010-0859.html
- http://www.securityfocus.com/bid/43845
- http://www.ubuntu.com/usn/USN-1005-1
- http://www.vupen.com/english/advisories/2010/2897
- http://www.vupen.com/english/advisories/2010/3097
- http://www.vupen.com/english/advisories/2011/0230
- https://bugzilla.redhat.com/show_bug.cgi?id=595245



