CVE-2008-1693

The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
http://secunia.com/advisories/29816
http://secunia.com/advisories/29834
http://secunia.com/advisories/29836
http://secunia.com/advisories/29851
http://secunia.com/advisories/29853
http://secunia.com/advisories/29868
http://secunia.com/advisories/29869
http://secunia.com/advisories/29884
http://secunia.com/advisories/29885
http://secunia.com/advisories/30019
http://secunia.com/advisories/30033
http://secunia.com/advisories/30717
http://secunia.com/advisories/31035
http://security.gentoo.org/glsa/glsa-200804-18.xml
http://securitytracker.com/id?1019893
http://www.debian.org/security/2008/dsa-1548 Patch
http://www.debian.org/security/2008/dsa-1606
http://www.mandriva.com/security/advisories?name=MDVSA-2008:089
http://www.mandriva.com/security/advisories?name=MDVSA-2008:173
http://www.mandriva.com/security/advisories?name=MDVSA-2008:197
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0238.html
http://www.redhat.com/support/errata/RHSA-2008-0239.html
http://www.redhat.com/support/errata/RHSA-2008-0240.html
http://www.redhat.com/support/errata/RHSA-2008-0262.html
http://www.securityfocus.com/bid/28830
http://www.ubuntu.com/usn/usn-603-1
http://www.ubuntu.com/usn/usn-603-2
http://www.vupen.com/english/advisories/2008/1265/references
http://www.vupen.com/english/advisories/2008/1266/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41884
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
http://secunia.com/advisories/29816
http://secunia.com/advisories/29834
http://secunia.com/advisories/29836
http://secunia.com/advisories/29851
http://secunia.com/advisories/29853
http://secunia.com/advisories/29868
http://secunia.com/advisories/29869
http://secunia.com/advisories/29884
http://secunia.com/advisories/29885
http://secunia.com/advisories/30019
http://secunia.com/advisories/30033
http://secunia.com/advisories/30717
http://secunia.com/advisories/31035
http://security.gentoo.org/glsa/glsa-200804-18.xml
http://securitytracker.com/id?1019893
http://www.debian.org/security/2008/dsa-1548 Patch
http://www.debian.org/security/2008/dsa-1606
http://www.mandriva.com/security/advisories?name=MDVSA-2008:089
http://www.mandriva.com/security/advisories?name=MDVSA-2008:173
http://www.mandriva.com/security/advisories?name=MDVSA-2008:197
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0238.html
http://www.redhat.com/support/errata/RHSA-2008-0239.html
http://www.redhat.com/support/errata/RHSA-2008-0240.html
http://www.redhat.com/support/errata/RHSA-2008-0262.html
http://www.securityfocus.com/bid/28830
http://www.ubuntu.com/usn/usn-603-1
http://www.ubuntu.com/usn/usn-603-2
http://www.vupen.com/english/advisories/2008/1265/references
http://www.vupen.com/english/advisories/2008/1266/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41884
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:45

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html -
References () http://secunia.com/advisories/29816 - () http://secunia.com/advisories/29816 -
References () http://secunia.com/advisories/29834 - () http://secunia.com/advisories/29834 -
References () http://secunia.com/advisories/29836 - () http://secunia.com/advisories/29836 -
References () http://secunia.com/advisories/29851 - () http://secunia.com/advisories/29851 -
References () http://secunia.com/advisories/29853 - () http://secunia.com/advisories/29853 -
References () http://secunia.com/advisories/29868 - () http://secunia.com/advisories/29868 -
References () http://secunia.com/advisories/29869 - () http://secunia.com/advisories/29869 -
References () http://secunia.com/advisories/29884 - () http://secunia.com/advisories/29884 -
References () http://secunia.com/advisories/29885 - () http://secunia.com/advisories/29885 -
References () http://secunia.com/advisories/30019 - () http://secunia.com/advisories/30019 -
References () http://secunia.com/advisories/30033 - () http://secunia.com/advisories/30033 -
References () http://secunia.com/advisories/30717 - () http://secunia.com/advisories/30717 -
References () http://secunia.com/advisories/31035 - () http://secunia.com/advisories/31035 -
References () http://security.gentoo.org/glsa/glsa-200804-18.xml - () http://security.gentoo.org/glsa/glsa-200804-18.xml -
References () http://securitytracker.com/id?1019893 - () http://securitytracker.com/id?1019893 -
References () http://www.debian.org/security/2008/dsa-1548 - Patch () http://www.debian.org/security/2008/dsa-1548 - Patch
References () http://www.debian.org/security/2008/dsa-1606 - () http://www.debian.org/security/2008/dsa-1606 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:089 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:089 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:173 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:173 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:197 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:197 -
References () http://www.novell.com/linux/security/advisories/2008_13_sr.html - () http://www.novell.com/linux/security/advisories/2008_13_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0238.html - () http://www.redhat.com/support/errata/RHSA-2008-0238.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0239.html - () http://www.redhat.com/support/errata/RHSA-2008-0239.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0240.html - () http://www.redhat.com/support/errata/RHSA-2008-0240.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0262.html - () http://www.redhat.com/support/errata/RHSA-2008-0262.html -
References () http://www.securityfocus.com/bid/28830 - () http://www.securityfocus.com/bid/28830 -
References () http://www.ubuntu.com/usn/usn-603-1 - () http://www.ubuntu.com/usn/usn-603-1 -
References () http://www.ubuntu.com/usn/usn-603-2 - () http://www.ubuntu.com/usn/usn-603-2 -
References () http://www.vupen.com/english/advisories/2008/1265/references - () http://www.vupen.com/english/advisories/2008/1265/references -
References () http://www.vupen.com/english/advisories/2008/1266/references - () http://www.vupen.com/english/advisories/2008/1266/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41884 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41884 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html -

Information

Published : 2008-04-18 15:05

Updated : 2024-11-21 00:45


NVD link : CVE-2008-1693

Mitre link : CVE-2008-1693

CVE.ORG link : CVE-2008-1693


JSON object : View

Products Affected

poppler

  • poppler
CWE
CWE-20

Improper Input Validation