Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1347-1 | New xpdf packages fix arbitrary code execution |
![]() |
DSA-1348-1 | New poppler packages fix arbitrary code execution |
![]() |
DSA-1349-1 | New libextractor packages fix arbitrary code execution |
![]() |
DSA-1350-1 | New tetex-bin packages fix arbitrary code execution |
![]() |
DSA-1352-1 | New pdfkit.framework packages fix arbitrary code execution |
![]() |
DSA-1354-1 | New gpdf packages fix arbitrary code execution |
![]() |
DSA-1355-1 | New kdegraphics packages fix arbitrary code execution |
![]() |
DSA-1357-1 | New koffice packages fix arbitrary code execution |
![]() |
USN-496-1 | koffice vulnerability |
![]() |
USN-496-2 | poppler vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:14:13.257Z
Reserved: 2007-06-25T00:00:00
Link: CVE-2007-3387

No data.

Status : Deferred
Published: 2007-07-30T23:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3387


No data.