CVE-2007-0104
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
09/01/2007
Last modified:
09/04/2025
Description
The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://docs.info.apple.com/article.html?artnum=305214
- http://projects.info-pull.com/moab/MOAB-06-01-2007.html
- http://secunia.com/advisories/23791
- http://secunia.com/advisories/23799
- http://secunia.com/advisories/23808
- http://secunia.com/advisories/23813
- http://secunia.com/advisories/23815
- http://secunia.com/advisories/23839
- http://secunia.com/advisories/23844
- http://secunia.com/advisories/23876
- http://secunia.com/advisories/24204
- http://secunia.com/advisories/24479
- http://securitytracker.com/id?1017514=
- http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
- http://www.kde.org/info/security/advisory-20070115-1.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A018
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A019
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A020
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A021
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A022
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A024
- http://www.novell.com/linux/security/advisories/2007_3_sr.html
- http://www.securityfocus.com/archive/1/457055/100/0/threaded
- http://www.securityfocus.com/bid/21910
- http://www.securitytracker.com/id?1017749=
- http://www.ubuntu.com/usn/usn-410-1
- http://www.ubuntu.com/usn/usn-410-2
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0203
- http://www.vupen.com/english/advisories/2007/0212
- http://www.vupen.com/english/advisories/2007/0244
- http://www.vupen.com/english/advisories/2007/0930
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
- https://issues.rpath.com/browse/RPL-964
- http://docs.info.apple.com/article.html?artnum=305214
- http://projects.info-pull.com/moab/MOAB-06-01-2007.html
- http://secunia.com/advisories/23791
- http://secunia.com/advisories/23799
- http://secunia.com/advisories/23808
- http://secunia.com/advisories/23813
- http://secunia.com/advisories/23815
- http://secunia.com/advisories/23839
- http://secunia.com/advisories/23844
- http://secunia.com/advisories/23876
- http://secunia.com/advisories/24204
- http://secunia.com/advisories/24479
- http://securitytracker.com/id?1017514=
- http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
- http://www.kde.org/info/security/advisory-20070115-1.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A018
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A019
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A020
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A021
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A022
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A024
- http://www.novell.com/linux/security/advisories/2007_3_sr.html
- http://www.securityfocus.com/archive/1/457055/100/0/threaded
- http://www.securityfocus.com/bid/21910
- http://www.securitytracker.com/id?1017749=
- http://www.ubuntu.com/usn/usn-410-1
- http://www.ubuntu.com/usn/usn-410-2
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0203
- http://www.vupen.com/english/advisories/2007/0212
- http://www.vupen.com/english/advisories/2007/0244
- http://www.vupen.com/english/advisories/2007/0930
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
- https://issues.rpath.com/browse/RPL-964



