kde 内存破坏拒绝服务代码执行漏洞

admin 2023-12-13 17:24:05 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 kde 内存破坏拒绝服务代码执行漏洞

CVE编号

CVE-2007-0104

利用情况

暂无

补丁情况

官方补丁

披露时间

2007-01-09
漏洞描述
The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://docs.info.apple.com/article.html?artnum=305214
http://projects.info-pull.com/moab/MOAB-06-01-2007.html
http://secunia.com/advisories/23791
http://secunia.com/advisories/23799
http://secunia.com/advisories/23808
http://secunia.com/advisories/23813
http://secunia.com/advisories/23815
http://secunia.com/advisories/23839
http://secunia.com/advisories/23844
http://secunia.com/advisories/23876
http://secunia.com/advisories/24204
http://secunia.com/advisories/24479
http://securitytracker.com/id?1017514
http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
http://www.kde.org/info/security/advisory-20070115-1.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
http://www.novell.com/linux/security/advisories/2007_3_sr.html
http://www.securityfocus.com/archive/1/457055/100/0/threaded
http://www.securityfocus.com/bid/21910
http://www.securitytracker.com/id?1017749
http://www.ubuntu.com/usn/usn-410-1
http://www.ubuntu.com/usn/usn-410-2
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://www.vupen.com/english/advisories/2007/0203
http://www.vupen.com/english/advisories/2007/0212
http://www.vupen.com/english/advisories/2007/0244
http://www.vupen.com/english/advisories/2007/0930
https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
https://issues.rpath.com/browse/RPL-964
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 xpdf xpdf 3.0 -
运行在以下环境
应用 xpdf xpdf 3.0.1 -
运行在以下环境
应用 xpdf xpdf 3.0.1_pl1 -
运行在以下环境
应用 xpdf xpdf 3.0.1_pl2 -
运行在以下环境
应用 xpdf xpdf 3.0_pl2 -
运行在以下环境
系统 debian_10 poppler * Up to (excluding) 0.4.5-5.1
运行在以下环境
系统 debian_11 poppler * Up to (excluding) 0.4.5-5.1
运行在以下环境
系统 debian_12 poppler * Up to (excluding) 0.4.5-5.1
运行在以下环境
系统 debian_sid poppler * Up to (excluding) 0.4.5-5.1
运行在以下环境
系统 suse_11 cups * Up to (excluding) 1.3.9-8.30
阿里云评分 5.8
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0