CVE Vulnerabilities

CVE-2010-3702

NULL Pointer Dereference

Published: Nov 05, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
5.8 IMPORTANT
AV:A/AC:L/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
CupsApple*1.3.11 (including)
PopplerFreedesktop0.8.7 (including)0.15.1 (including)
XpdfXpdfreader*3.01 (including)
XpdfXpdfreader3.02 (including)3.02 (including)
XpdfXpdfreader3.02-pl1 (including)3.02-pl1 (including)
XpdfXpdfreader3.02-pl2 (including)3.02-pl2 (including)
XpdfXpdfreader3.02-pl3 (including)3.02-pl3 (including)
XpdfXpdfreader3.02-pl4 (including)3.02-pl4 (including)
Red Hat Enterprise Linux 3RedHatxpdf-1:2.02-19.el3*
Red Hat Enterprise Linux 3RedHatcups-1:1.1.17-13.3.70*
Red Hat Enterprise Linux 4RedHatxpdf-1:3.00-24.el4_8.1*
Red Hat Enterprise Linux 4RedHatgpdf-0:2.8.2-7.7.2.el4_8.7*
Red Hat Enterprise Linux 4RedHatkdegraphics-7:3.3.1-18.el4_8.1*
Red Hat Enterprise Linux 4RedHatcups-1:1.1.22-0.rc1.9.32.el4_8.10*
Red Hat Enterprise Linux 5RedHatpoppler-0:0.5.4-4.4.el5_5.14*
Red Hat Enterprise Linux 5RedHatkdegraphics-7:3.5.4-17.el5_5.1*
Red Hat Enterprise Linux 5RedHattetex-0:3.0-33.15.el5_8.1*
Red Hat Enterprise Linux 6RedHatpoppler-0:0.12.4-3.el6_0.1*
GpdfUbuntudapper*
IpeUbuntuartful*
IpeUbuntubionic*
IpeUbuntucosmic*
IpeUbuntudapper*
IpeUbuntudisco*
IpeUbuntueoan*
IpeUbuntufocal*
IpeUbuntugroovy*
IpeUbuntuhardy*
IpeUbuntuhirsute*
IpeUbuntuimpish*
IpeUbuntujaunty*
IpeUbuntukarmic*
IpeUbuntukinetic*
IpeUbuntulucid*
IpeUbuntulunar*
IpeUbuntumantic*
IpeUbuntumaverick*
IpeUbuntunatty*
IpeUbuntuoneiric*
IpeUbuntuoracular*
IpeUbuntuplucky*
IpeUbuntuprecise*
IpeUbuntuquantal*
IpeUbunturaring*
IpeUbuntusaucy*
IpeUbuntutrusty*
IpeUbuntuutopic*
IpeUbuntuvivid*
IpeUbuntuwily*
IpeUbuntuxenial*
IpeUbuntuyakkety*
IpeUbuntuzesty*
KofficeUbuntudapper*
KofficeUbuntuhardy*
KofficeUbuntujaunty*
LibextractorUbuntuartful*
LibextractorUbuntucosmic*
LibextractorUbuntudapper*
LibextractorUbuntudisco*
LibextractorUbuntueoan*
LibextractorUbuntugroovy*
LibextractorUbuntuhardy*
LibextractorUbuntuhirsute*
LibextractorUbuntuimpish*
LibextractorUbuntujaunty*
LibextractorUbuntukarmic*
LibextractorUbuntulucid*
LibextractorUbuntumaverick*
LibextractorUbuntunatty*
LibextractorUbuntuoneiric*
LibextractorUbuntuprecise*
LibextractorUbuntuquantal*
LibextractorUbunturaring*
LibextractorUbuntusaucy*
LibextractorUbuntutrusty*
LibextractorUbuntuutopic*
LibextractorUbuntuvivid*
LibextractorUbuntuwily*
LibextractorUbuntuxenial*
LibextractorUbuntuyakkety*
LibextractorUbuntuzesty*
Pdfkit.frameworkUbuntudapper*
PdftohtmlUbuntudapper*
PopplerUbuntudapper*
PopplerUbuntuhardy*
PopplerUbuntujaunty*
PopplerUbuntukarmic*
PopplerUbuntulucid*
PopplerUbuntumaverick*
PopplerUbuntuupstream*
XpdfUbuntudapper*
XpdfUbuntuhardy*
XpdfUbuntujaunty*
XpdfUbuntukarmic*
XpdfUbuntulucid*
XpdfUbuntumaverick*
XpdfUbuntuupstream*

Potential Mitigations

References