First published: Mon Jul 30 2007(Updated: )
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf | =3.02 | |
CUPS | <=1.3.11 | |
Poppler Data | <0.5.91 | |
gpdf project gpdf | <2.8.2 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu | =7.04 | |
Ubuntu | =6.10 | |
Ubuntu | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-3387 is classified as critical, as it allows remote code execution through crafted PDF files.
To fix CVE-2007-3387, upgrade affected software to versions that have resolved this vulnerability, such as updated versions of Xpdf, Poppler, gpdf, and CUPS.
CVE-2007-3387 affects several software products, including Xpdf 3.02, Poppler versions before 0.5.91, gpdf versions before 2.8.2, and various others.
Yes, CVE-2007-3387 can be exploited remotely by attackers using maliciously crafted PDF files.
CVE-2007-3387 affects multiple platforms, including Debian and Ubuntu distributions, specifically versions 3.1, 4.0, and various 6.x to 7.x releases.