CERTA-2007-AVI-341
Vulnerability from certfr_avis - Published: - Updated:
Un utilisateur malveillant pourrait, par le biais d'un document au format PDF spécialement conçu, exécuter du code arbitraire à distance.
Description
Dans la fonction StreamPredictor::StreamPredictor de gpdf, il est possible de provoquer un débordement d'entier. Ce problème permettrait à un utilisateur malveillant, par le biais d'un document au format PDF spécialement conçu, d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- gpdf versions antérieures à 2.8.2 ;
- applications dérivées ou utilisatrices, telles CUPS, kdegraphics, Xpdf, poppler.
Cette liste d'applications n'est pas limitative.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cUL\u003e \u003cLI\u003e\u003cSPAN class=\"textit\"\u003egpdf\u003c/SPAN\u003e versions ant\u00e9rieures \u00e0 2.8.2 ;\u003c/LI\u003e \u003cLI\u003eapplications d\u00e9riv\u00e9es ou utilisatrices, telles \u003cSPAN class=\n \"textit\"\u003eCUPS\u003c/SPAN\u003e, \u003cSPAN class=\"textit\"\u003ekdegraphics\u003c/SPAN\u003e, \u003cSPAN class=\"textit\"\u003eXpdf\u003c/SPAN\u003e, \u003cSPAN class=\n \"textit\"\u003epoppler\u003c/SPAN\u003e.\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003eCette liste d\u0027applications n\u0027est pas limitative.\u003c/P\u003e",
"content": "## Description\n\nDans la fonction StreamPredictor::StreamPredictor de gpdf, il est\npossible de provoquer un d\u00e9bordement d\u0027entier. Ce probl\u00e8me permettrait \u00e0\nun utilisateur malveillant, par le biais d\u0027un document au format PDF\nsp\u00e9cialement con\u00e7u, d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1352 du 07 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:163 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:160 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:016 du 10 ao\u00fbt 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0731 du 01 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0731.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0732 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0732.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:158 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-496-1 du 07 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1354 du 13 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHatKDE du 30 juillet 2007 :",
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:165 du 15 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1355 du 13 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:162 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0730 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0730.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:015 du 03 ao\u00fbt 2007 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00003.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-496-2 du 07 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0729 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0729.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1350 du 06 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1347 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1348 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1349 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1357 du 19 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:164 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:161 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0735 du 30 juillet 2007 : http://rhn.redhat.com/errata/RHSA-2007-0735.html",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0732.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0720 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0720.html"
}
],
"reference": "CERTA-2007-AVI-341",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-01T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandriva, Debian, SuSE, Red Hat.",
"revision_date": "2007-08-16T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2007-08-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Un utilisateur malveillant pourrait, par le biais d\u0027un document au\nformat PDF sp\u00e9cialement con\u00e7u, ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans gpdf et d\u00e9riv\u00e9s",
"vendor_advisories": [
{
"published_at": null,
"title": "CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…