The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.

Project Subscriptions

Vendors Products
Foolabs Subscribe
Glyphandcog Subscribe
Xpdfreader Subscribe
Kdegraphics Subscribe
Poppler Subscribe
Poppler Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2135-1 New xpdf packages fix several vulnerabilities
EUVD EUVD EUVD-2010-3687 The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
Ubuntu USN Ubuntu USN USN-1005-1 poppler vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch cve-icon cve-icon
http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1201.html cve-icon cve-icon
http://secunia.com/advisories/42141 cve-icon cve-icon
http://secunia.com/advisories/42357 cve-icon cve-icon
http://secunia.com/advisories/42397 cve-icon cve-icon
http://secunia.com/advisories/42691 cve-icon cve-icon
http://secunia.com/advisories/43079 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720 cve-icon cve-icon
http://www.debian.org/security/2010/dsa-2119 cve-icon cve-icon
http://www.debian.org/security/2010/dsa-2135 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:228 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:229 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:230 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:231 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2012:144 cve-icon cve-icon
http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/10/04/6 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0749.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0751.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0752.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0753.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0859.html cve-icon cve-icon
http://www.securityfocus.com/bid/43841 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-1005-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/2897 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3097 cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/0230 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=638960 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-3704 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-3704 cve-icon
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01134}

epss

{'score': 0.01533}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T03:18:53.042Z

Reserved: 2010-10-01T00:00:00

Link: CVE-2010-3704

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-11-05T18:00:25.983

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3704

cve-icon Redhat

Severity : Important

Publid Date: 2010-09-24T00:00:00Z

Links: CVE-2010-3704 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses