← Zuruck zu CVEs
CVE-2011-0764
N/ABeschreibung
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht3/31/2011
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
foolabs:xpdfglyphandcog:xpdfreadert1lib:t1lib
Schwachen (CWE)
CWE-20
Referenzen
http://rhn.redhat.com/errata/RHSA-2012-1201.html(cret@cert.org)
http://secunia.com/advisories/43823(cret@cert.org)
http://secunia.com/advisories/47347(cret@cert.org)
http://secunia.com/advisories/48985(cret@cert.org)
http://securityreason.com/securityalert/8171(cret@cert.org)
http://securitytracker.com/id?1025266(cret@cert.org)
http://www.foolabs.com/xpdf/download.html(cret@cert.org)
http://www.kb.cert.org/vuls/id/376500(cret@cert.org)
http://www.kb.cert.org/vuls/id/MAPG-8ECL8X(cret@cert.org)
http://www.securityfocus.com/archive/1/517205/100/0/threaded(cret@cert.org)
http://www.securityfocus.com/bid/46941(cret@cert.org)
http://www.toucan-system.com/advisories/tssa-2011-01.txt(cret@cert.org)
http://www.ubuntu.com/usn/USN-1316-1(cret@cert.org)
http://www.vupen.com/english/advisories/2011/0728(cret@cert.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66208(cret@cert.org)
https://security.gentoo.org/glsa/201701-57(cret@cert.org)
http://rhn.redhat.com/errata/RHSA-2012-1201.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43823(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/47347(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48985(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/8171(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1025266(af854a3a-2127-422b-91ae-364da2661108)
http://www.foolabs.com/xpdf/download.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/376500(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/MAPG-8ECL8X(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:002(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:144(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/517205/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/46941(af854a3a-2127-422b-91ae-364da2661108)
http://www.toucan-system.com/advisories/tssa-2011-01.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1316-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0728(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66208(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-57(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.