Vulnerabilities > CVE-2010-4653 - Integer Overflow or Wraparound vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
An integer overflow condition in poppler before 0.16.3 can occur when parsing CharCodes for fonts.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Forced Integer Overflow This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201310-03.NASL description The remote host is affected by the vulnerability described in GLSA-201310-03 (Poppler: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted PDF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 70309 published 2013-10-07 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70309 title GLSA-201310-03 : Poppler: Multiple vulnerabilities NASL family SuSE Local Security Checks NASL id SUSE_XPDF-7324.NASL description This update of xpdf fixes an out-of-bounds write in CharCodeToUnicode.cc and a bad instruction pointer while parsing malformed PDF files. last seen 2020-06-01 modified 2020-06-02 plugin id 52163 published 2011-02-24 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/52163 title SuSE 10 Security Update : xpdf (ZYPP Patch Number 7324) NASL family SuSE Local Security Checks NASL id SUSE_11_XPDF-TOOLS-110126.NASL description This update of xpdf fixes an out-of-bounds write in CharCodeToUnicode.cc and a bad instruction pointer while parsing malformed PDF files. last seen 2020-06-01 modified 2020-06-02 plugin id 52162 published 2011-02-24 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/52162 title SuSE 11.1 Security Update : xpdf-tools (SAT Patch Number 3857)
References
- http://security.gentoo.org/glsa/glsa-201310-03.xml
- http://www.securityfocus.com/bid/45948
- https://access.redhat.com/security/cve/cve-2010-4653
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
- https://security-tracker.debian.org/tracker/CVE-2010-4653
- http://security.gentoo.org/glsa/glsa-201310-03.xml
- https://security-tracker.debian.org/tracker/CVE-2010-4653
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
- https://access.redhat.com/security/cve/cve-2010-4653
- http://www.securityfocus.com/bid/45948