CVE-2013-7296
26.01.2014, 01:55
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.Enginsight
Vendor | Product | Version |
---|---|---|
freedesktop | poppler | 𝑥 ≤ 0.24.3 |
freedesktop | poppler | 0.1 |
freedesktop | poppler | 0.1.1 |
freedesktop | poppler | 0.1.2 |
freedesktop | poppler | 0.2.0 |
freedesktop | poppler | 0.10.0 |
freedesktop | poppler | 0.10.1 |
freedesktop | poppler | 0.10.2 |
freedesktop | poppler | 0.10.3 |
freedesktop | poppler | 0.10.4 |
freedesktop | poppler | 0.10.5 |
freedesktop | poppler | 0.10.6 |
freedesktop | poppler | 0.10.7 |
freedesktop | poppler | 0.11.0 |
freedesktop | poppler | 0.11.1 |
freedesktop | poppler | 0.11.2 |
freedesktop | poppler | 0.11.3 |
freedesktop | poppler | 0.12.0 |
freedesktop | poppler | 0.12.1 |
freedesktop | poppler | 0.12.2 |
freedesktop | poppler | 0.12.3 |
freedesktop | poppler | 0.12.4 |
freedesktop | poppler | 0.13.0 |
freedesktop | poppler | 0.13.1 |
freedesktop | poppler | 0.13.2 |
freedesktop | poppler | 0.13.3 |
freedesktop | poppler | 0.13.4 |
freedesktop | poppler | 0.14.0 |
freedesktop | poppler | 0.14.1 |
freedesktop | poppler | 0.14.2 |
freedesktop | poppler | 0.14.3 |
freedesktop | poppler | 0.14.4 |
freedesktop | poppler | 0.14.5 |
freedesktop | poppler | 0.15.0 |
freedesktop | poppler | 0.15.1 |
freedesktop | poppler | 0.15.2 |
freedesktop | poppler | 0.15.3 |
freedesktop | poppler | 0.16.0 |
freedesktop | poppler | 0.16.1 |
freedesktop | poppler | 0.16.2 |
freedesktop | poppler | 0.16.3 |
freedesktop | poppler | 0.16.4 |
freedesktop | poppler | 0.16.5 |
freedesktop | poppler | 0.16.6 |
freedesktop | poppler | 0.16.7 |
freedesktop | poppler | 0.17.0 |
freedesktop | poppler | 0.17.1 |
freedesktop | poppler | 0.17.2 |
freedesktop | poppler | 0.17.3 |
freedesktop | poppler | 0.17.4 |
freedesktop | poppler | 0.18.0 |
freedesktop | poppler | 0.18.1 |
freedesktop | poppler | 0.18.2 |
freedesktop | poppler | 0.18.3 |
freedesktop | poppler | 0.18.4 |
freedesktop | poppler | 0.19.0 |
freedesktop | poppler | 0.19.1 |
freedesktop | poppler | 0.19.2 |
freedesktop | poppler | 0.19.3 |
freedesktop | poppler | 0.19.4 |
freedesktop | poppler | 0.20.0 |
freedesktop | poppler | 0.20.1 |
freedesktop | poppler | 0.20.2 |
freedesktop | poppler | 0.20.3 |
freedesktop | poppler | 0.20.4 |
freedesktop | poppler | 0.20.5 |
freedesktop | poppler | 0.21.0 |
freedesktop | poppler | 0.21.1 |
freedesktop | poppler | 0.21.2 |
freedesktop | poppler | 0.21.3 |
freedesktop | poppler | 0.21.4 |
freedesktop | poppler | 0.22.0 |
freedesktop | poppler | 0.22.1 |
freedesktop | poppler | 0.22.2 |
freedesktop | poppler | 0.22.3 |
freedesktop | poppler | 0.22.4 |
freedesktop | poppler | 0.23.0 |
freedesktop | poppler | 0.23.1 |
freedesktop | poppler | 0.23.2 |
freedesktop | poppler | 0.23.3 |
freedesktop | poppler | 0.23.4 |
freedesktop | poppler | 0.24.0 |
freedesktop | poppler | 0.24.1 |
freedesktop | poppler | 0.24.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References