Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7511 (GCVE-0-2017-7511)
Vulnerability from cvelistv5 – Published: 2017-05-30 18:00 – Updated: 2024-08-05 16:04
VLAI?
EPSS
Summary
poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:04:11.847Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-201801-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "poppler",
"vendor": "Poppler",
"versions": [
{
"status": "affected",
"version": "since 0.17.3"
}
]
}
],
"datePublic": "2017-05-26T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-18T10:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "GLSA-201801-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2017-7511",
"datePublished": "2017-05-30T18:00:00.000Z",
"dateReserved": "2017-04-05T00:00:00.000Z",
"dateUpdated": "2024-08-05T16:04:11.847Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-MQRH-MCFQ-VC54
Vulnerability from github – Published: 2022-05-14 03:49 – Updated: 2022-05-14 03:49
VLAI?
Details
poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2017-7511"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-05-30T18:29:00Z",
"severity": "MODERATE"
},
"details": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.",
"id": "GHSA-mqrh-mcfq-vc54",
"modified": "2022-05-14T03:49:11Z",
"published": "2022-05-14T03:49:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7511"
},
{
"type": "WEB",
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2017-09903
Vulnerability from cnvd - Published: 2017-06-16
VLAI Severity ?
Title
Poppler pdfunite拒绝服务漏洞
Description
Poppler是一个用于生成PDF的C++类库,该库是从Xpdf(PDF阅读器)继承而来。pdfunite是一个Ruby包装器。
Poppler 0.17.3之后的版本中的pdfunite存在安全漏洞。攻击者可借助特制的文档利用该漏洞造成拒绝服务(空指针逆向引用)。
Severity
中
Patch Name
Poppler pdfunite拒绝服务漏洞的补丁
Patch Description
Poppler是一个用于生成PDF的C++类库,该库是从Xpdf(PDF阅读器)继承而来。pdfunite是一个Ruby包装器。
Poppler 0.17.3之后的版本中的pdfunite存在安全漏洞。攻击者可借助特制的文档利用该漏洞造成拒绝服务(空指针逆向引用)。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: https://github.com/danigm/poppler
Reference
https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a
Impacted products
| Name | Freedesktop Poppler >0.17.3 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-7511"
}
},
"description": "Poppler\u662f\u4e00\u4e2a\u7528\u4e8e\u751f\u6210PDF\u7684C++\u7c7b\u5e93\uff0c\u8be5\u5e93\u662f\u4eceXpdf\uff08PDF\u9605\u8bfb\u5668\uff09\u7ee7\u627f\u800c\u6765\u3002pdfunite\u662f\u4e00\u4e2aRuby\u5305\u88c5\u5668\u3002\r\n\r\nPoppler 0.17.3\u4e4b\u540e\u7684\u7248\u672c\u4e2d\u7684pdfunite\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u6863\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u7a7a\u6307\u9488\u9006\u5411\u5f15\u7528\uff09\u3002",
"discovererName": "Albert Astals Cid",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://github.com/danigm/poppler",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-09903",
"openTime": "2017-06-16",
"patchDescription": "Poppler\u662f\u4e00\u4e2a\u7528\u4e8e\u751f\u6210PDF\u7684C++\u7c7b\u5e93\uff0c\u8be5\u5e93\u662f\u4eceXpdf\uff08PDF\u9605\u8bfb\u5668\uff09\u7ee7\u627f\u800c\u6765\u3002pdfunite\u662f\u4e00\u4e2aRuby\u5305\u88c5\u5668\u3002\r\n\r\nPoppler 0.17.3\u4e4b\u540e\u7684\u7248\u672c\u4e2d\u7684pdfunite\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u6863\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u7a7a\u6307\u9488\u9006\u5411\u5f15\u7528\uff09\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Poppler pdfunite\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Freedesktop Poppler \u003e0.17.3"
},
"referenceLink": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a",
"serverity": "\u4e2d",
"submitTime": "2017-06-02",
"title": "Poppler pdfunite\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2017-7511
Vulnerability from fkie_nvd - Published: 2017-05-30 18:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B464004-B108-400A-8EF1-66C9BDDD0431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2E179689-E881-4528-BB29-F0BD41B2611C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAEB0E8-B097-44EE-B3C2-674B2E0D880E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED35025A-5A38-4114-BE98-90665BE328A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B8269E19-8D3D-4D46-BA38-5B4259279927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBACC6D-F45C-4E7F-AF57-5F2636BFAC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87CC490B-2653-45B2-B76E-27C58F804807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1620ED7-17B5-42B3-A331-EA0DB4F3A73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA33265-F8EB-4D5F-AFCE-2DBFB6BFED62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FA407987-21C8-4930-9D03-B74210490E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8192A381-A80E-4800-A85C-B799AACFE897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "23516598-8E84-4092-BA33-695E7A352175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F90CD7B-E988-4ADA-8809-9220F8309C05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "855A2B51-945A-4007-8F6A-8C198B19BC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8B83EE-113B-49CC-A168-ED373B8E9F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBF9CF8-AE84-4609-9347-173D1E1D5F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "527709DC-A1FC-47C0-AC6B-2833EF0CC277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "15A1B4BE-12A6-43DF-959C-965E75F04875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5FDFC91E-9123-4729-916F-24E62742B149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0090ED0-AF62-4A40-85E1-5502C0E5B6D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BEACB5-13A1-48DF-BC2A-0AF71B6671BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "154F4DAA-76BF-4948-8258-C42A0B595012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD61DCAA-F9D3-4FD2-9712-8BA7A9A85241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9240BEED-D541-463F-9398-94ED5D4BDE01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33A6A0-1B2D-431F-81E1-A5262BCC74E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC71349-603D-41CA-B3EA-B87D85655BB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1EF51EEB-10F6-41A9-A1EF-AF1D451B102E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8216A541-D100-4483-9465-85A5A8F44732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F85615D2-85A2-4FD0-835B-D4920E89966C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3FD3F9-923B-4FCA-AC67-E79412671842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F49AC59-9B97-409A-8C78-5D5738AB361C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0FBA6A3-E6A7-431C-8A64-577E971A144D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "795D282A-9BD3-409B-8153-1AF98FCD6EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9416A79E-C8A7-4027-B2D5-70C2523EDDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "226369BB-7875-4F49-AF96-B6B358ED5EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2448981A-3CEE-432B-87C4-646E3D782F2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C88AC80-9F18-4E16-B5FD-C17CB71EF645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EAD55A-8FB3-45A3-9A1B-B122FB43B85C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B77F65E7-EB4E-47DA-ABBE-F567E640A130",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.24.5:*:*:*:*:*:*:*",
"matchCriteriaId": "44DE4C6F-0A10-4646-98A0-CC3EC354106E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "115B8110-637D-4537-B55F-BBF17FD5CA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.25.1:*:*:*:*:*:*:*",
"matchCriteriaId": "188DA744-4043-48E6-9654-5AA544B71C56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.25.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48E56212-1ED1-4501-907D-AD89EBF5CA93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E766F143-B220-4BA2-B919-D93010389156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E88AF71B-0B40-48A3-BA28-7EF4F770D931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F86E9C28-1F08-457E-8E9C-7906461FFFB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4831F246-6BBA-439A-B531-A7ACAF3A0F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7651591C-8581-47CB-BB73-F8ABFA12FF50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.4:*:*:*:*:*:*:*",
"matchCriteriaId": "067C6A60-EB47-4C64-A425-5849461975D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.26.5:*:*:*:*:*:*:*",
"matchCriteriaId": "79049531-300B-406B-BA61-C061F623A234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "456B9F7A-3477-4C52-AA98-4048472D8F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58C3FF6D-64AA-4C0E-B8C5-F6A5DB55123D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.29.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44169D4B-E7F4-4EBA-8194-44B40FD23E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.30.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D882F4-0E9F-4706-B2D9-9E673361B019",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A2A6BD-4AFF-4FEB-BAD5-AC2CBF43955F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "269376B9-48D9-4635-9319-428359EDD878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.33.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD8F8D2-450F-4444-A06D-CAAAE4FC8F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.34.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8C81C3-1CD1-4468-91AF-C42C7CC96ABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.35.0:*:*:*:*:*:*:*",
"matchCriteriaId": "829E041C-D50E-47E4-AE79-F83359610EF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.36.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB75D4B-C71F-4FFD-9EB6-CB4B1EEFAC60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.37.0:*:*:*:*:*:*:*",
"matchCriteriaId": "55EE5D3F-1CF1-438B-BC64-E71209CFB143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.38.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F533478-2BB4-4FB7-8624-C69AE2E33B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75BD6DA0-031A-402D-8FA8-5BDEDBF06CDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.40.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2549859C-C034-4D65-90CE-9345956956CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.41.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A56532E-9E1A-48B9-BF63-BE780E57C346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.42.0:*:*:*:*:*:*:*",
"matchCriteriaId": "179270EF-94DD-49B8-A51C-DAA743A9F34A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.43.0:*:*:*:*:*:*:*",
"matchCriteriaId": "42F76112-FB22-4747-8BA1-A3DA5697B4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.44.0:*:*:*:*:*:*:*",
"matchCriteriaId": "505309BB-8F47-42A0-A54F-4A8DD5B76332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.45.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3021150D-E502-499F-BD1A-8C257FE05CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.46.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE940DE8-E301-4FEC-9EF3-49DAA2D74B96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.47.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8EF57B4-D092-421D-825F-BA3E61E2982F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.48.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C58C87-0646-4B38-8D9D-B3A6223E7D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.49.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6137D912-BE3A-4859-8839-78E7531552E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.50.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC76599A-3943-4247-8675-44554C7DE07C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.51.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FF10096F-19F7-47EA-9C04-DC40F41E6562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.52.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66BD66B6-F645-4830-9F37-104A75FCB838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.53.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F00C454-6F80-4468-8FD3-DCBDFDF1438B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*",
"matchCriteriaId": "740347EF-5003-40B2-863C-D86A246DD21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.55.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD5175D-E501-4679-8B24-5FBABD6FF1CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents."
},
{
"lang": "es",
"value": "poppler desde versi\u00f3n 0.17.3, ha sido vulnerable a una desreferencia del puntero NULL en pdfunite desencadenada por documentos especialmente dise\u00f1ados."
}
],
"id": "CVE-2017-7511",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-30T18:29:00.287",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2017-7511
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-7511",
"description": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.",
"id": "GSD-2017-7511",
"references": [
"https://www.suse.com/security/cve/CVE-2017-7511.html",
"https://ubuntu.com/security/CVE-2017-7511",
"https://advisories.mageia.org/CVE-2017-7511.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-7511"
],
"details": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.",
"id": "GSD-2017-7511",
"modified": "2023-12-13T01:21:06.386724Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7511",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "poppler",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "since 0.17.3"
}
]
}
}
]
},
"vendor_name": "Poppler"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-476",
"lang": "eng",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a",
"refsource": "MISC",
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
},
{
"name": "https://security.gentoo.org/glsa/201801-17",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201801-17"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.53.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.52.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.45.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.44.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.37.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.36.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.28.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.28.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.25.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.25.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.55.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.47.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.46.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.38.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.31.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.30.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.49.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.48.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.41.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.40.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.33.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.32.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.29.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.24.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.51.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.50.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.43.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.42.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.35.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.34.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.26.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.25.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.25.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7511"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a"
},
{
"name": "GLSA-201801-17",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201801-17"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2018-01-18T18:18Z",
"publishedDate": "2017-05-30T18:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…