CVE-2011-1553

Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
OR cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2012-1201.html - () http://rhn.redhat.com/errata/RHSA-2012-1201.html -
References () http://secunia.com/advisories/43823 - Vendor Advisory () http://secunia.com/advisories/43823 - Vendor Advisory
References () http://secunia.com/advisories/48985 - () http://secunia.com/advisories/48985 -
References () http://securityreason.com/securityalert/8171 - () http://securityreason.com/securityalert/8171 -
References () http://securitytracker.com/id?1025266 - () http://securitytracker.com/id?1025266 -
References () http://www.foolabs.com/xpdf/download.html - Patch () http://www.foolabs.com/xpdf/download.html - Patch
References () http://www.kb.cert.org/vuls/id/376500 - US Government Resource () http://www.kb.cert.org/vuls/id/376500 - US Government Resource
References () http://www.kb.cert.org/vuls/id/MAPG-8ECL8X - US Government Resource () http://www.kb.cert.org/vuls/id/MAPG-8ECL8X - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:144 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:144 -
References () http://www.securityfocus.com/archive/1/517205/100/0/threaded - () http://www.securityfocus.com/archive/1/517205/100/0/threaded -
References () http://www.toucan-system.com/advisories/tssa-2011-01.txt - () http://www.toucan-system.com/advisories/tssa-2011-01.txt -
References () http://www.vupen.com/english/advisories/2011/0728 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0728 - Vendor Advisory
References () https://security.gentoo.org/glsa/201701-57 - () https://security.gentoo.org/glsa/201701-57 -

Information

Published : 2011-03-31 23:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1553

Mitre link : CVE-2011-1553

CVE.ORG link : CVE-2011-1553


JSON object : View

Products Affected

foolabs

  • xpdf

glyphandcog

  • xpdfreader

t1lib

  • t1lib
CWE
CWE-399

Resource Management Errors