cve-2007-5392
Vulnerability from cvelistv5
Published
2007-11-08 02:00
Modified
2024-08-07 15:31
Severity ?
Summary
Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
References
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/26503Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27260Patch, Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27553Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27573Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27574Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27575Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27577Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27578Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27599Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27615Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27618Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27619Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27632
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27634
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27636
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27637Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27640Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27641
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27642
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27645
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27656
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27658
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27705
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27721
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27724
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27743
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27856
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28043
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28812
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29104
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29604
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30168
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2007-88/advisory/Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://security.gentoo.org/glsa/glsa-200711-22.xml
PSIRT-CNA@flexerasoftware.comhttp://security.gentoo.org/glsa/glsa-200711-34.xml
PSIRT-CNA@flexerasoftware.comhttp://security.gentoo.org/glsa/glsa-200805-13.xml
PSIRT-CNA@flexerasoftware.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
PSIRT-CNA@flexerasoftware.comhttp://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html
PSIRT-CNA@flexerasoftware.comhttp://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html
PSIRT-CNA@flexerasoftware.comhttp://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html
PSIRT-CNA@flexerasoftware.comhttp://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html
PSIRT-CNA@flexerasoftware.comhttp://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2008/dsa-1480
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2008/dsa-1509
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2008/dsa-1537
PSIRT-CNA@flexerasoftware.comhttp://www.kde.org/info/security/advisory-20071107-1.txt
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:219
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:220
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:221
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:222
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:223
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:227
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:228
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:230
PSIRT-CNA@flexerasoftware.comhttp://www.novell.com/linux/security/advisories/2007_60_pdf.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1021.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1022.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1024.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1025.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1026.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1027.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1029.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1030.htmlVendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/483372
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/26367
PSIRT-CNA@flexerasoftware.comhttp://www.securitytracker.com/id?1018905
PSIRT-CNA@flexerasoftware.comhttp://www.ubuntu.com/usn/usn-542-1
PSIRT-CNA@flexerasoftware.comhttp://www.ubuntu.com/usn/usn-542-2
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3774
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3775
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3776
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3779
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3786
PSIRT-CNA@flexerasoftware.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/38303
PSIRT-CNA@flexerasoftware.comhttps://issues.rpath.com/browse/RPL-1926
PSIRT-CNA@flexerasoftware.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:31:58.169Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SA:2007:060",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_60_pdf.html"
          },
          {
            "name": "27632",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27632"
          },
          {
            "name": "27743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27743"
          },
          {
            "name": "MDKSA-2007:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:222"
          },
          {
            "name": "ADV-2007-3774",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3774"
          },
          {
            "name": "27260",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27260"
          },
          {
            "name": "27856",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27856"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html"
          },
          {
            "name": "27636",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27636"
          },
          {
            "name": "29604",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29604"
          },
          {
            "name": "MDKSA-2007:223",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:223"
          },
          {
            "name": "27721",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27721"
          },
          {
            "name": "27724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27724"
          },
          {
            "name": "ADV-2007-3776",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3776"
          },
          {
            "name": "FEDORA-2007-3059",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html"
          },
          {
            "name": "27577",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27577"
          },
          {
            "name": "29104",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29104"
          },
          {
            "name": "FEDORA-2007-3031",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html"
          },
          {
            "name": "27618",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27618"
          },
          {
            "name": "27642",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27642"
          },
          {
            "name": "FEDORA-2007-4031",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html"
          },
          {
            "name": "27656",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27656"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2007-88/advisory/"
          },
          {
            "name": "FEDORA-2007-3100",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html"
          },
          {
            "name": "RHSA-2007:1026",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1026.html"
          },
          {
            "name": "DSA-1509",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1509"
          },
          {
            "name": "RHSA-2007:1022",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1022.html"
          },
          {
            "name": "27573",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27573"
          },
          {
            "name": "RHSA-2007:1029",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1029.html"
          },
          {
            "name": "27641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27641"
          },
          {
            "name": "GLSA-200805-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
          },
          {
            "name": "28812",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28812"
          },
          {
            "name": "DSA-1537",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1537"
          },
          {
            "name": "FEDORA-2007-750",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
          },
          {
            "name": "SSA:2007-316-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
          },
          {
            "name": "26367",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26367"
          },
          {
            "name": "27615",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27615"
          },
          {
            "name": "RHSA-2007:1021",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1021.html"
          },
          {
            "name": "ADV-2007-3786",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3786"
          },
          {
            "name": "27645",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27645"
          },
          {
            "name": "20071107 Secunia Research: Xpdf \"Stream.cc\" Multiple Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/483372"
          },
          {
            "name": "30168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30168"
          },
          {
            "name": "27574",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27574"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1926"
          },
          {
            "name": "26503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26503"
          },
          {
            "name": "MDKSA-2007:219",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:219"
          },
          {
            "name": "DSA-1480",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1480"
          },
          {
            "name": "GLSA-200711-22",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-22.xml"
          },
          {
            "name": "27634",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27634"
          },
          {
            "name": "MDKSA-2007:227",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:227"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kde.org/info/security/advisory-20071107-1.txt"
          },
          {
            "name": "28043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28043"
          },
          {
            "name": "oval:org.mitre.oval:def:10036",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036"
          },
          {
            "name": "27619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27619"
          },
          {
            "name": "xpdf-dctstreamreset-bo(38303)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38303"
          },
          {
            "name": "MDKSA-2007:220",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:220"
          },
          {
            "name": "27705",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27705"
          },
          {
            "name": "27578",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27578"
          },
          {
            "name": "27640",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27640"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html"
          },
          {
            "name": "GLSA-200711-34",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
          },
          {
            "name": "27599",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27599"
          },
          {
            "name": "27575",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27575"
          },
          {
            "name": "1018905",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018905"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html"
          },
          {
            "name": "FEDORA-2007-3390",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
          },
          {
            "name": "MDKSA-2007:228",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:228"
          },
          {
            "name": "ADV-2007-3775",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3775"
          },
          {
            "name": "RHSA-2007:1027",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1027.html"
          },
          {
            "name": "RHSA-2007:1030",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
          },
          {
            "name": "USN-542-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-542-1"
          },
          {
            "name": "27658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27658"
          },
          {
            "name": "RHSA-2007:1024",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1024.html"
          },
          {
            "name": "MDKSA-2007:230",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
          },
          {
            "name": "USN-542-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-542-2"
          },
          {
            "name": "RHSA-2007:1025",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1025.html"
          },
          {
            "name": "ADV-2007-3779",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3779"
          },
          {
            "name": "MDKSA-2007:221",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:221"
          },
          {
            "name": "27553",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27553"
          },
          {
            "name": "27637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "SUSE-SA:2007:060",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_60_pdf.html"
        },
        {
          "name": "27632",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27632"
        },
        {
          "name": "27743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27743"
        },
        {
          "name": "MDKSA-2007:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:222"
        },
        {
          "name": "ADV-2007-3774",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3774"
        },
        {
          "name": "27260",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27260"
        },
        {
          "name": "27856",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27856"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html"
        },
        {
          "name": "27636",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27636"
        },
        {
          "name": "29604",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29604"
        },
        {
          "name": "MDKSA-2007:223",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:223"
        },
        {
          "name": "27721",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27721"
        },
        {
          "name": "27724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27724"
        },
        {
          "name": "ADV-2007-3776",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3776"
        },
        {
          "name": "FEDORA-2007-3059",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html"
        },
        {
          "name": "27577",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27577"
        },
        {
          "name": "29104",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29104"
        },
        {
          "name": "FEDORA-2007-3031",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html"
        },
        {
          "name": "27618",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27618"
        },
        {
          "name": "27642",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27642"
        },
        {
          "name": "FEDORA-2007-4031",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html"
        },
        {
          "name": "27656",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27656"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2007-88/advisory/"
        },
        {
          "name": "FEDORA-2007-3100",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html"
        },
        {
          "name": "RHSA-2007:1026",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1026.html"
        },
        {
          "name": "DSA-1509",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1509"
        },
        {
          "name": "RHSA-2007:1022",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1022.html"
        },
        {
          "name": "27573",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27573"
        },
        {
          "name": "RHSA-2007:1029",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1029.html"
        },
        {
          "name": "27641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27641"
        },
        {
          "name": "GLSA-200805-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
        },
        {
          "name": "28812",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28812"
        },
        {
          "name": "DSA-1537",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1537"
        },
        {
          "name": "FEDORA-2007-750",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
        },
        {
          "name": "SSA:2007-316-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
        },
        {
          "name": "26367",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26367"
        },
        {
          "name": "27615",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27615"
        },
        {
          "name": "RHSA-2007:1021",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1021.html"
        },
        {
          "name": "ADV-2007-3786",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3786"
        },
        {
          "name": "27645",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27645"
        },
        {
          "name": "20071107 Secunia Research: Xpdf \"Stream.cc\" Multiple Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/483372"
        },
        {
          "name": "30168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30168"
        },
        {
          "name": "27574",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27574"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1926"
        },
        {
          "name": "26503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26503"
        },
        {
          "name": "MDKSA-2007:219",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:219"
        },
        {
          "name": "DSA-1480",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1480"
        },
        {
          "name": "GLSA-200711-22",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-22.xml"
        },
        {
          "name": "27634",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27634"
        },
        {
          "name": "MDKSA-2007:227",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:227"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kde.org/info/security/advisory-20071107-1.txt"
        },
        {
          "name": "28043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28043"
        },
        {
          "name": "oval:org.mitre.oval:def:10036",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036"
        },
        {
          "name": "27619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27619"
        },
        {
          "name": "xpdf-dctstreamreset-bo(38303)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38303"
        },
        {
          "name": "MDKSA-2007:220",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:220"
        },
        {
          "name": "27705",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27705"
        },
        {
          "name": "27578",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27578"
        },
        {
          "name": "27640",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27640"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html"
        },
        {
          "name": "GLSA-200711-34",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
        },
        {
          "name": "27599",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27599"
        },
        {
          "name": "27575",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27575"
        },
        {
          "name": "1018905",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018905"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html"
        },
        {
          "name": "FEDORA-2007-3390",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
        },
        {
          "name": "MDKSA-2007:228",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:228"
        },
        {
          "name": "ADV-2007-3775",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3775"
        },
        {
          "name": "RHSA-2007:1027",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1027.html"
        },
        {
          "name": "RHSA-2007:1030",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
        },
        {
          "name": "USN-542-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-542-1"
        },
        {
          "name": "27658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27658"
        },
        {
          "name": "RHSA-2007:1024",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1024.html"
        },
        {
          "name": "MDKSA-2007:230",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
        },
        {
          "name": "USN-542-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-542-2"
        },
        {
          "name": "RHSA-2007:1025",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1025.html"
        },
        {
          "name": "ADV-2007-3779",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3779"
        },
        {
          "name": "MDKSA-2007:221",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:221"
        },
        {
          "name": "27553",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27553"
        },
        {
          "name": "27637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2007-5392",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SA:2007:060",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_60_pdf.html"
            },
            {
              "name": "27632",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27632"
            },
            {
              "name": "27743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27743"
            },
            {
              "name": "MDKSA-2007:222",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:222"
            },
            {
              "name": "ADV-2007-3774",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3774"
            },
            {
              "name": "27260",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27260"
            },
            {
              "name": "27856",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27856"
            },
            {
              "name": "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html",
              "refsource": "CONFIRM",
              "url": "http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html"
            },
            {
              "name": "27636",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27636"
            },
            {
              "name": "29604",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29604"
            },
            {
              "name": "MDKSA-2007:223",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:223"
            },
            {
              "name": "27721",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27721"
            },
            {
              "name": "27724",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27724"
            },
            {
              "name": "ADV-2007-3776",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3776"
            },
            {
              "name": "FEDORA-2007-3059",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html"
            },
            {
              "name": "27577",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27577"
            },
            {
              "name": "29104",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29104"
            },
            {
              "name": "FEDORA-2007-3031",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html"
            },
            {
              "name": "27618",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27618"
            },
            {
              "name": "27642",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27642"
            },
            {
              "name": "FEDORA-2007-4031",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html"
            },
            {
              "name": "27656",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27656"
            },
            {
              "name": "http://secunia.com/secunia_research/2007-88/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2007-88/advisory/"
            },
            {
              "name": "FEDORA-2007-3100",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html"
            },
            {
              "name": "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html",
              "refsource": "CONFIRM",
              "url": "http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html"
            },
            {
              "name": "RHSA-2007:1026",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1026.html"
            },
            {
              "name": "DSA-1509",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1509"
            },
            {
              "name": "RHSA-2007:1022",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1022.html"
            },
            {
              "name": "27573",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27573"
            },
            {
              "name": "RHSA-2007:1029",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1029.html"
            },
            {
              "name": "27641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27641"
            },
            {
              "name": "GLSA-200805-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
            },
            {
              "name": "28812",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28812"
            },
            {
              "name": "DSA-1537",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1537"
            },
            {
              "name": "FEDORA-2007-750",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html"
            },
            {
              "name": "SSA:2007-316-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
            },
            {
              "name": "26367",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26367"
            },
            {
              "name": "27615",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27615"
            },
            {
              "name": "RHSA-2007:1021",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1021.html"
            },
            {
              "name": "ADV-2007-3786",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3786"
            },
            {
              "name": "27645",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27645"
            },
            {
              "name": "20071107 Secunia Research: Xpdf \"Stream.cc\" Multiple Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/483372"
            },
            {
              "name": "30168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30168"
            },
            {
              "name": "27574",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27574"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1926",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1926"
            },
            {
              "name": "26503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26503"
            },
            {
              "name": "MDKSA-2007:219",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:219"
            },
            {
              "name": "DSA-1480",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1480"
            },
            {
              "name": "GLSA-200711-22",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-22.xml"
            },
            {
              "name": "27634",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27634"
            },
            {
              "name": "MDKSA-2007:227",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:227"
            },
            {
              "name": "http://www.kde.org/info/security/advisory-20071107-1.txt",
              "refsource": "CONFIRM",
              "url": "http://www.kde.org/info/security/advisory-20071107-1.txt"
            },
            {
              "name": "28043",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28043"
            },
            {
              "name": "oval:org.mitre.oval:def:10036",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036"
            },
            {
              "name": "27619",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27619"
            },
            {
              "name": "xpdf-dctstreamreset-bo(38303)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38303"
            },
            {
              "name": "MDKSA-2007:220",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:220"
            },
            {
              "name": "27705",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27705"
            },
            {
              "name": "27578",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27578"
            },
            {
              "name": "27640",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27640"
            },
            {
              "name": "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html",
              "refsource": "CONFIRM",
              "url": "http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html"
            },
            {
              "name": "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html",
              "refsource": "CONFIRM",
              "url": "http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html"
            },
            {
              "name": "GLSA-200711-34",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
            },
            {
              "name": "27599",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27599"
            },
            {
              "name": "27575",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27575"
            },
            {
              "name": "1018905",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018905"
            },
            {
              "name": "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html",
              "refsource": "CONFIRM",
              "url": "http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html"
            },
            {
              "name": "FEDORA-2007-3390",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html"
            },
            {
              "name": "MDKSA-2007:228",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:228"
            },
            {
              "name": "ADV-2007-3775",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3775"
            },
            {
              "name": "RHSA-2007:1027",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1027.html"
            },
            {
              "name": "RHSA-2007:1030",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1030.html"
            },
            {
              "name": "USN-542-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-542-1"
            },
            {
              "name": "27658",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27658"
            },
            {
              "name": "RHSA-2007:1024",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1024.html"
            },
            {
              "name": "MDKSA-2007:230",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:230"
            },
            {
              "name": "USN-542-2",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-542-2"
            },
            {
              "name": "RHSA-2007:1025",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1025.html"
            },
            {
              "name": "ADV-2007-3779",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3779"
            },
            {
              "name": "MDKSA-2007:221",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:221"
            },
            {
              "name": "27553",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27553"
            },
            {
              "name": "27637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2007-5392",
    "datePublished": "2007-11-08T02:00:00",
    "dateReserved": "2007-10-12T00:00:00",
    "dateUpdated": "2024-08-07T15:31:58.169Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-5392\",\"sourceIdentifier\":\"PSIRT-CNA@flexerasoftware.com\",\"published\":\"2007-11-08T02:46:00.000\",\"lastModified\":\"2017-09-29T01:29:36.173\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en el m\u00e9todo DCTStream::reset en el archivo xpdf/Stream.cc en Xpdf versi\u00f3n 3.02p11, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF dise\u00f1ado, resultando en un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A09900-C462-4E3D-9399-0271F91DC5BD\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/26503\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27260\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27553\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27573\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27574\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27575\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27577\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27578\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27599\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27615\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27618\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27619\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27632\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27634\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27636\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27637\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27640\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27641\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27642\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27645\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27656\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27658\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27705\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27721\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27724\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27743\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/27856\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/28043\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/28812\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/29104\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/29604\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/advisories/30168\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://secunia.com/secunia_research/2007-88/advisory/\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-22.xml\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-34.xml\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-13.xml\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1480\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1509\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1537\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.kde.org/info/security/advisory-20071107-1.txt\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:219\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:220\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:221\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:222\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:223\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:227\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:228\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:230\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_60_pdf.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1021.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1022.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1024.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1025.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1026.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1027.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1029.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1030.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/483372\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.securityfocus.com/bid/26367\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.securitytracker.com/id?1018905\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-542-1\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-542-2\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3774\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3775\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3776\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3779\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3786\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38303\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1926\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10036\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html\",\"source\":\"PSIRT-CNA@flexerasoftware.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.