fkie_cve-2013-4473
Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2024-11-21 01:55
Severity ?
Summary
Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FAB528-98AD-47D3-99FB-3B1CA071704B", "versionEndIncluding": "0.24.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "28BB4DC8-BCD6-44EB-BD73-C650AF47FE19", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB2E8A2B-D2FC-4840-BC26-DB2A0E4DA4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "81AD541A-77B3-44D3-9442-BAD8888331B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FA68DBB-D9AE-4326-AAF4-0D8EF2594107", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "037C2903-D964-46E6-9C56-D547E6C40F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "17379F92-64FE-4956-B241-6843726C87D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "84EE2328-63E4-4BF3-BBB4-C0C40E54AF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "03580443-C13D-4ABD-82A9-452EA02D7B45", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1DB12DC-622F-4F28-A91D-5EC07CEB477D", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BEF0F47-3F69-4DB0-A7B8-C986A430834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "9664566B-28F7-45DC-B59B-845DF2AA635E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3790BFE0-971B-46DE-B060-1D0F408F54BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "C48D7A7C-0B5E-41B0-B873-0AEAD4D79034", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F8CC2DA-01A9-426C-8A43-39F35DEB4D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8644AD8-7867-483A-B9A2-7663F53B4640", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8850C474-5EA2-4BC5-B9D1-099F8BE161EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A1B9CB74-99FB-4ED2-A173-AE325CCA0890", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B4A8973-84AF-434B-B0F5-958CEAFCEFE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "0C6706D8-CB52-4CDA-938E-B44AAA687D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.90:*:*:*:*:*:*:*", "matchCriteriaId": "408E7D83-8D04-4584-AFA6-42196A6D99B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.5.91:*:*:*:*:*:*:*", "matchCriteriaId": "6059804F-09AF-4D66-B297-85A21E8725D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B627E11-43A6-41BE-9BD6-AD5C99B35D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3ADA618A-D673-44BF-ABFA-8EB95EEF0102", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "335FA773-87BC-440E-99BC-46805D9ADA7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F1DA1DA-94FB-41A7-BCB5-1118E5983A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8BD46429-7295-43ED-8541-7AD3CAAB2B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A5ECCE4-7586-4EEB-9085-7D8DB49E28EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8240022B-EF85-4C18-9B47-CA7DDC125CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "3098380E-14D2-4DD4-A6A5-70F5D3A256EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B978283-552D-4573-B318-E6FDFBFAE09C", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "6544F688-064C-4004-A3B1-DBFEF6D3B601", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E91CA0-674F-4ECD-B58B-1CCD85A8B497", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2B1618F-71A0-4796-892A-7E1B61BB5729", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6B7AD8C3-6F02-4D32-9B7C-41F865030BDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "4BEFD9C7-768F-4751-9242-1206A63D8E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DBC42677-F36E-4E6B-88CB-2B34E690D0ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "B9D05260-CE4B-4EDF-879A-E4CB0C174A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA54F7CA-4B73-40AF-BF78-B76CA901AD44", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "47FC185E-9D39-491F-A1FD-F48ACC07E966", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B2CA2BF-AF2A-40AC-AAAA-5D9FA77DEB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE791B58-693B-447C-A949-4915D08707A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "66BE0E8A-4816-4530-911D-73F4E4EC7621", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "271E2F6D-5DAC-4B48-A6DC-C1BD5424D7BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2578912-1929-4CCC-B718-60279F5DD9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "8739E30F-7987-4749-926A-45B53220D95B", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "907F732E-2AC2-4C66-B240-03C5B1A8BE89", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "36176CB9-CB8A-4B54-855D-76D0C9FFA4A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "B2E6F617-47EA-40A7-8140-D220F73895C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "3BFF932F-B15C-426C-8368-918BD5397326", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "D2E2EF83-C5EF-4A07-9690-D1659AB88AED", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "906DB5B3-3AD3-4763-9B97-0875485701AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BF81A03-C47B-4250-BF4C-C637662876EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE65D66E-F51E-4B14-901D-8EA47C128CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF00D9C1-07DE-43DF-8185-A06406F61ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6B36DB5-6D7D-475D-BD6B-AF1401C41EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "443737A0-75DE-436D-81C0-FC94CB23F2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D0BBE-D4B4-4CF2-91F1-50864DC92F43", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "03727E0E-E5E9-40EF-B3B6-05B600F04282", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9DC337D-EBB4-403D-B32D-7B195725CD05", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AEF3348-5BB0-45CB-B59B-4A90EEAAF2BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "949E12C4-97BA-4D56-B18E-4AC032834D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "40A9D590-FF77-4181-B46C-668249A9B255", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B0CC3B1-C3F6-4211-9B68-5ACD0834F8CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6F4179FF-0856-4F0E-8487-3B9B94D89DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D991BB6-38E6-4E0B-8C15-6EC5F3058DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "379D1862-1EF5-462B-9727-D3F4E14FEB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "A60E0080-2617-40C1-8796-DDE2846546BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "2DC44976-236F-4796-B7B7-FFF107B44F5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "47D1FC9F-4DFD-4923-9C70-0EA3A7F95F8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB53D75E-917C-4D01-960B-4E6503C19E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2CD559C-B0FD-4ED1-AB8B-93EFB1B536FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E970BB-37CA-441C-8D2E-CAEBA1E4671A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADA83F24-7708-4751-BE4F-A33EFF77D1BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "3896B9F2-83A0-40AB-A3BC-20BE0415B5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E6C7D9F-BC8C-4C31-AC76-978E7E461571", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "78CCF102-5C54-49AC-9CE5-A2E1CD062C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF9EBACF-EE24-4991-B7D0-DCA028A699DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9AD76-9D5A-4EED-816F-84D12D2617BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "043A5C6F-8E1D-4B4F-9F47-8C9A331AA13A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "039CF6A6-6273-4BA7-B517-075AAA8F206D", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.6:*:*:*:*:*:*:*", "matchCriteriaId": "79708E36-EBBE-43E8-918C-A006DAE59D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.16.7:*:*:*:*:*:*:*", "matchCriteriaId": "7DF74129-BF02-4CB2-8813-8825FA28D39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "069D3AF1-92EB-493C-B465-AD080D16A0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4A74B84-7805-4DB3-B589-C95A41538258", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DC0B895-B214-44F2-8552-D4CE27CA71B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B464004-B108-400A-8EF1-66C9BDDD0431", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "2E179689-E881-4528-BB29-F0BD41B2611C", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBAEB0E8-B097-44EE-B3C2-674B2E0D880E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED35025A-5A38-4114-BE98-90665BE328A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8269E19-8D3D-4D46-BA38-5B4259279927", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "7DBACC6D-F45C-4E7F-AF57-5F2636BFAC6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*", "matchCriteriaId": "87CC490B-2653-45B2-B76E-27C58F804807", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1620ED7-17B5-42B3-A331-EA0DB4F3A73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FA33265-F8EB-4D5F-AFCE-2DBFB6BFED62", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA407987-21C8-4930-9D03-B74210490E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "8192A381-A80E-4800-A85C-B799AACFE897", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "23516598-8E84-4092-BA33-695E7A352175", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F90CD7B-E988-4ADA-8809-9220F8309C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "855A2B51-945A-4007-8F6A-8C198B19BC13", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A8B83EE-113B-49CC-A168-ED373B8E9F85", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF9CF8-AE84-4609-9347-173D1E1D5F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*", "matchCriteriaId": "527709DC-A1FC-47C0-AC6B-2833EF0CC277", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*", "matchCriteriaId": "15A1B4BE-12A6-43DF-959C-965E75F04875", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FDFC91E-9123-4729-916F-24E62742B149", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "C0090ED0-AF62-4A40-85E1-5502C0E5B6D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9BEACB5-13A1-48DF-BC2A-0AF71B6671BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "154F4DAA-76BF-4948-8258-C42A0B595012", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD61DCAA-F9D3-4FD2-9712-8BA7A9A85241", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "9240BEED-D541-463F-9398-94ED5D4BDE01", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E33A6A0-1B2D-431F-81E1-A5262BCC74E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "EBC71349-603D-41CA-B3EA-B87D85655BB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "1EF51EEB-10F6-41A9-A1EF-AF1D451B102E", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "8216A541-D100-4483-9465-85A5A8F44732", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3FD3F9-923B-4FCA-AC67-E79412671842", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F49AC59-9B97-409A-8C78-5D5738AB361C", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0FBA6A3-E6A7-431C-8A64-577E971A144D", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "795D282A-9BD3-409B-8153-1AF98FCD6EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "9416A79E-C8A7-4027-B2D5-70C2523EDDA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "226369BB-7875-4F49-AF96-B6B358ED5EF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n extractPages de utils/pdfseparate.cc en Poppler anterior a la versi\u00f3n 0.24.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un nombre de archivo fuente." } ], "id": "CVE-2013-4473", "lastModified": "2024-11-21T01:55:38.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-23T11:55:04.633", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://bugs.debian.org/723124" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/utils/pdfseparate.cc?id=b8682d868ddf7f741e93b" }, { "source": "secalert@redhat.com", "url": "http://cgit.freedesktop.org/poppler/poppler/tree/NEWS" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/56567" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/63368" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2958-1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.debian.org/723124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/utils/pdfseparate.cc?id=b8682d868ddf7f741e93b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cgit.freedesktop.org/poppler/poppler/tree/NEWS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/63368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2958-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.