Unrated severityNVD Advisory· Published Nov 5, 2010· Updated Apr 29, 2026
CVE-2010-3702
CVE-2010-3702
Description
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
Affected products
29cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*range: <=3.01
- cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
- cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
- cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
- cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
- cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
41- cgit.freedesktop.org/poppler/poppler/commit/nvdPatchVendor Advisory
- www.openwall.com/lists/oss-security/2010/10/04/6nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1201.htmlnvdThird Party Advisory
- secunia.com/advisories/42141nvdThird Party Advisory
- secunia.com/advisories/42357nvdThird Party Advisory
- secunia.com/advisories/42397nvdThird Party Advisory
- secunia.com/advisories/42691nvdThird Party Advisory
- secunia.com/advisories/43079nvdThird Party Advisory
- slackware.com/security/viewer.phpnvdThird Party Advisory
- www.debian.org/security/2010/dsa-2119nvdThird Party Advisory
- www.debian.org/security/2010/dsa-2135nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0749.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0750.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0751.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0752.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0753.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0754.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0755.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0859.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/43845nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1005-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/2897nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3097nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0230nvdThird Party Advisory
- ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patchnvdBroken Link
News mentions
0No linked articles in our index yet.