Unrated severityNVD Advisory· Published Jul 30, 2007· Updated Apr 23, 2026
CVE-2007-3387
CVE-2007-3387
Description
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
Affected products
9- cpe:2.3:a:xpdfreader:xpdf:3.02:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
94- bugs.gentoo.org/show_bug.cginvdIssue TrackingThird Party Advisory
- bugzilla.redhat.com/bugzilla/show_bug.cginvdIssue TrackingThird Party Advisory
- secunia.com/advisories/26188nvdThird Party Advisory
- secunia.com/advisories/26251nvdThird Party Advisory
- secunia.com/advisories/26254nvdThird Party Advisory
- secunia.com/advisories/26255nvdThird Party Advisory
- secunia.com/advisories/26257nvdThird Party Advisory
- secunia.com/advisories/26278nvdThird Party Advisory
- secunia.com/advisories/26281nvdThird Party Advisory
- secunia.com/advisories/26283nvdThird Party Advisory
- secunia.com/advisories/26292nvdThird Party Advisory
- secunia.com/advisories/26293nvdThird Party Advisory
- secunia.com/advisories/26297nvdThird Party Advisory
- secunia.com/advisories/26307nvdThird Party Advisory
- secunia.com/advisories/26318nvdThird Party Advisory
- secunia.com/advisories/26325nvdThird Party Advisory
- secunia.com/advisories/26342nvdThird Party Advisory
- secunia.com/advisories/26343nvdThird Party Advisory
- secunia.com/advisories/26358nvdThird Party Advisory
- secunia.com/advisories/26365nvdThird Party Advisory
- secunia.com/advisories/26370nvdThird Party Advisory
- secunia.com/advisories/26395nvdThird Party Advisory
- secunia.com/advisories/26403nvdThird Party Advisory
- secunia.com/advisories/26405nvdThird Party Advisory
- secunia.com/advisories/26407nvdThird Party Advisory
- secunia.com/advisories/26410nvdThird Party Advisory
- secunia.com/advisories/26413nvdThird Party Advisory
- secunia.com/advisories/26425nvdThird Party Advisory
- secunia.com/advisories/26432nvdThird Party Advisory
- secunia.com/advisories/26436nvdThird Party Advisory
- secunia.com/advisories/26467nvdThird Party Advisory
- secunia.com/advisories/26468nvdThird Party Advisory
- secunia.com/advisories/26470nvdThird Party Advisory
- secunia.com/advisories/26514nvdThird Party Advisory
- secunia.com/advisories/26607nvdThird Party Advisory
- secunia.com/advisories/26627nvdThird Party Advisory
- secunia.com/advisories/26862nvdThird Party Advisory
- secunia.com/advisories/26982nvdThird Party Advisory
- secunia.com/advisories/27156nvdThird Party Advisory
- secunia.com/advisories/27281nvdThird Party Advisory
- secunia.com/advisories/27308nvdThird Party Advisory
- secunia.com/advisories/27637nvdThird Party Advisory
- secunia.com/advisories/30168nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200709-12.xmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200709-17.xmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200710-20.xmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200711-34.xmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200805-13.xmlnvdThird Party Advisory
- slackware.com/security/viewer.phpnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2007-401.htmnvdThird Party Advisory
- www.debian.org/security/2007/dsa-1347nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1348nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1349nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1350nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1352nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1354nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1355nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1357nvdThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200710-08.xmlnvdThird Party Advisory
- www.kde.org/info/security/advisory-20070730-1.txtnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0720.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0729.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0730.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0731.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0732.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0735.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/476508/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/476519/30/5400/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/476765/30/5340/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/25124nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.slackware.org/security/viewer.phpnvdThird Party Advisory
- www.ubuntu.com/usn/usn-496-1nvdThird Party Advisory
- www.ubuntu.com/usn/usn-496-2nvdThird Party Advisory
- www.vupen.com/english/advisories/2007/2704nvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2007/2705nvdPermissions RequiredThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149nvdThird Party Advisory
- ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patchnvdBroken Link
- patches.sgi.com/support/free/security/advisories/20070801-01-P.ascnvdBroken Link
- osvdb.org/40127nvdBroken Link
- sourceforge.net/project/shownotes.phpnvdBroken Link
- www.novell.com/linux/security/advisories/2007_15_sr.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2007_16_sr.htmlnvdBroken Link
- issues.foresightlinux.org/browse/FL-471nvdBroken Link
- issues.rpath.com/browse/RPL-1596nvdBroken Link
- issues.rpath.com/browse/RPL-1604nvdBroken Link
News mentions
0No linked articles in our index yet.