VYPR
Unrated severityNVD Advisory· Published Nov 5, 2010· Updated Apr 29, 2026

CVE-2010-3704

CVE-2010-3704

Description

The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.

Affected products

75
  • cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*+ 20 more
    • cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*range: <=3.02
    • cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*+ 34 more
    • cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
    • cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*+ 17 more
    • cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

37

News mentions

0

No linked articles in our index yet.