cve-2013-4474
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-06 16:45
Severity ?
Summary
Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.323Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/723124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
          },
          {
            "name": "56567",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56567"
          },
          {
            "name": "GLSA-201401-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
          },
          {
            "name": "63374",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/63374"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
          },
          {
            "name": "USN-2958-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2958-1"
          },
          {
            "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/723124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
        },
        {
          "name": "56567",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56567"
        },
        {
          "name": "GLSA-201401-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
        },
        {
          "name": "63374",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/63374"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
        },
        {
          "name": "USN-2958-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2958-1"
        },
        {
          "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/723124",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/723124"
            },
            {
              "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75",
              "refsource": "CONFIRM",
              "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
            },
            {
              "name": "56567",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56567"
            },
            {
              "name": "GLSA-201401-21",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
            },
            {
              "name": "63374",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/63374"
            },
            {
              "name": "https://bugs.freedesktop.org/show_bug.cgi?id=69434",
              "refsource": "CONFIRM",
              "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
            },
            {
              "name": "USN-2958-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2958-1"
            },
            {
              "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4474",
    "datePublished": "2013-11-23T11:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4474\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-11-23T11:55:04.663\",\"lastModified\":\"2016-12-31T02:59:04.827\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de formato de cadena en la funci\u00f3n extractPages en utils/pdfseparate.cc de Poppler anterior a la versi\u00f3n 024.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de especificadores de cadena en un nombre de archivo de destino.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.24.1\",\"matchCriteriaId\":\"E1FAB528-98AD-47D3-99FB-3B1CA071704B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BB4DC8-BCD6-44EB-BD73-C650AF47FE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB2E8A2B-D2FC-4840-BC26-DB2A0E4DA4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81AD541A-77B3-44D3-9442-BAD8888331B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA68DBB-D9AE-4326-AAF4-0D8EF2594107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"037C2903-D964-46E6-9C56-D547E6C40F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17379F92-64FE-4956-B241-6843726C87D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84EE2328-63E4-4BF3-BBB4-C0C40E54AF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03580443-C13D-4ABD-82A9-452EA02D7B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DB12DC-622F-4F28-A91D-5EC07CEB477D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEF0F47-3F69-4DB0-A7B8-C986A430834F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9664566B-28F7-45DC-B59B-845DF2AA635E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3790BFE0-971B-46DE-B060-1D0F408F54BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C48D7A7C-0B5E-41B0-B873-0AEAD4D79034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8CC2DA-01A9-426C-8A43-39F35DEB4D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8644AD8-7867-483A-B9A2-7663F53B4640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8850C474-5EA2-4BC5-B9D1-099F8BE161EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B9CB74-99FB-4ED2-A173-AE325CCA0890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4A8973-84AF-434B-B0F5-958CEAFCEFE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6706D8-CB52-4CDA-938E-B44AAA687D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408E7D83-8D04-4584-AFA6-42196A6D99B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6059804F-09AF-4D66-B297-85A21E8725D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B627E11-43A6-41BE-9BD6-AD5C99B35D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADA618A-D673-44BF-ABFA-8EB95EEF0102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"335FA773-87BC-440E-99BC-46805D9ADA7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F1DA1DA-94FB-41A7-BCB5-1118E5983A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD46429-7295-43ED-8541-7AD3CAAB2B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A5ECCE4-7586-4EEB-9085-7D8DB49E28EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8240022B-EF85-4C18-9B47-CA7DDC125CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3098380E-14D2-4DD4-A6A5-70F5D3A256EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B978283-552D-4573-B318-E6FDFBFAE09C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6544F688-064C-4004-A3B1-DBFEF6D3B601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E91CA0-674F-4ECD-B58B-1CCD85A8B497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B1618F-71A0-4796-892A-7E1B61BB5729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7AD8C3-6F02-4D32-9B7C-41F865030BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEFD9C7-768F-4751-9242-1206A63D8E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC42677-F36E-4E6B-88CB-2B34E690D0ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D05260-CE4B-4EDF-879A-E4CB0C174A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA54F7CA-4B73-40AF-BF78-B76CA901AD44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FC185E-9D39-491F-A1FD-F48ACC07E966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B2CA2BF-AF2A-40AC-AAAA-5D9FA77DEB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE791B58-693B-447C-A949-4915D08707A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE0E8A-4816-4530-911D-73F4E4EC7621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"271E2F6D-5DAC-4B48-A6DC-C1BD5424D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2578912-1929-4CCC-B718-60279F5DD9DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8739E30F-7987-4749-926A-45B53220D95B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907F732E-2AC2-4C66-B240-03C5B1A8BE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36176CB9-CB8A-4B54-855D-76D0C9FFA4A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E6F617-47EA-40A7-8140-D220F73895C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFF932F-B15C-426C-8368-918BD5397326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF83-C5EF-4A07-9690-D1659AB88AED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906DB5B3-3AD3-4763-9B97-0875485701AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BF81A03-C47B-4250-BF4C-C637662876EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE65D66E-F51E-4B14-901D-8EA47C128CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF00D9C1-07DE-43DF-8185-A06406F61ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B36DB5-6D7D-475D-BD6B-AF1401C41EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443737A0-75DE-436D-81C0-FC94CB23F2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7D0BBE-D4B4-4CF2-91F1-50864DC92F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03727E0E-E5E9-40EF-B3B6-05B600F04282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9DC337D-EBB4-403D-B32D-7B195725CD05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AEF3348-5BB0-45CB-B59B-4A90EEAAF2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"949E12C4-97BA-4D56-B18E-4AC032834D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A9D590-FF77-4181-B46C-668249A9B255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0CC3B1-C3F6-4211-9B68-5ACD0834F8CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4179FF-0856-4F0E-8487-3B9B94D89DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D991BB6-38E6-4E0B-8C15-6EC5F3058DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"379D1862-1EF5-462B-9727-D3F4E14FEB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60E0080-2617-40C1-8796-DDE2846546BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC44976-236F-4796-B7B7-FFF107B44F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D1FC9F-4DFD-4923-9C70-0EA3A7F95F8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB53D75E-917C-4D01-960B-4E6503C19E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2CD559C-B0FD-4ED1-AB8B-93EFB1B536FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E970BB-37CA-441C-8D2E-CAEBA1E4671A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA83F24-7708-4751-BE4F-A33EFF77D1BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896B9F2-83A0-40AB-A3BC-20BE0415B5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6C7D9F-BC8C-4C31-AC76-978E7E461571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78CCF102-5C54-49AC-9CE5-A2E1CD062C9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9EBACF-EE24-4991-B7D0-DCA028A699DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE9AD76-9D5A-4EED-816F-84D12D2617BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"043A5C6F-8E1D-4B4F-9F47-8C9A331AA13A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039CF6A6-6273-4BA7-B517-075AAA8F206D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79708E36-EBBE-43E8-918C-A006DAE59D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF74129-BF02-4CB2-8813-8825FA28D39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069D3AF1-92EB-493C-B465-AD080D16A0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A74B84-7805-4DB3-B589-C95A41538258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC0B895-B214-44F2-8552-D4CE27CA71B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B464004-B108-400A-8EF1-66C9BDDD0431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E179689-E881-4528-BB29-F0BD41B2611C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAEB0E8-B097-44EE-B3C2-674B2E0D880E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED35025A-5A38-4114-BE98-90665BE328A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8269E19-8D3D-4D46-BA38-5B4259279927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DBACC6D-F45C-4E7F-AF57-5F2636BFAC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87CC490B-2653-45B2-B76E-27C58F804807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1620ED7-17B5-42B3-A331-EA0DB4F3A73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA33265-F8EB-4D5F-AFCE-2DBFB6BFED62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA407987-21C8-4930-9D03-B74210490E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8192A381-A80E-4800-A85C-B799AACFE897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23516598-8E84-4092-BA33-695E7A352175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F90CD7B-E988-4ADA-8809-9220F8309C05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855A2B51-945A-4007-8F6A-8C198B19BC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8B83EE-113B-49CC-A168-ED373B8E9F85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBF9CF8-AE84-4609-9347-173D1E1D5F14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"527709DC-A1FC-47C0-AC6B-2833EF0CC277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15A1B4BE-12A6-43DF-959C-965E75F04875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FDFC91E-9123-4729-916F-24E62742B149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0090ED0-AF62-4A40-85E1-5502C0E5B6D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9BEACB5-13A1-48DF-BC2A-0AF71B6671BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154F4DAA-76BF-4948-8258-C42A0B595012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD61DCAA-F9D3-4FD2-9712-8BA7A9A85241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9240BEED-D541-463F-9398-94ED5D4BDE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E33A6A0-1B2D-431F-81E1-A5262BCC74E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC71349-603D-41CA-B3EA-B87D85655BB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF51EEB-10F6-41A9-A1EF-AF1D451B102E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8216A541-D100-4483-9465-85A5A8F44732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3FD3F9-923B-4FCA-AC67-E79412671842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F49AC59-9B97-409A-8C78-5D5738AB361C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FBA6A3-E6A7-431C-8A64-577E971A144D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795D282A-9BD3-409B-8153-1AF98FCD6EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416A79E-C8A7-4027-B2D5-70C2523EDDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226369BB-7875-4F49-AF96-B6B358ED5EF8\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/723124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/56567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201401-21.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/10/29/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/63374\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2958-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=69434\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.