fkie_cve-2008-1693
Vulnerability from fkie_nvd
Published
2008-04-18 15:05
Modified
2025-04-09 00:30
Severity ?
Summary
The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
References
security@ubuntu.comhttp://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
security@ubuntu.comhttp://secunia.com/advisories/29816
security@ubuntu.comhttp://secunia.com/advisories/29834
security@ubuntu.comhttp://secunia.com/advisories/29836
security@ubuntu.comhttp://secunia.com/advisories/29851
security@ubuntu.comhttp://secunia.com/advisories/29853
security@ubuntu.comhttp://secunia.com/advisories/29868
security@ubuntu.comhttp://secunia.com/advisories/29869
security@ubuntu.comhttp://secunia.com/advisories/29884
security@ubuntu.comhttp://secunia.com/advisories/29885
security@ubuntu.comhttp://secunia.com/advisories/30019
security@ubuntu.comhttp://secunia.com/advisories/30033
security@ubuntu.comhttp://secunia.com/advisories/30717
security@ubuntu.comhttp://secunia.com/advisories/31035
security@ubuntu.comhttp://security.gentoo.org/glsa/glsa-200804-18.xml
security@ubuntu.comhttp://securitytracker.com/id?1019893
security@ubuntu.comhttp://www.debian.org/security/2008/dsa-1548Patch
security@ubuntu.comhttp://www.debian.org/security/2008/dsa-1606
security@ubuntu.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:089
security@ubuntu.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:173
security@ubuntu.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:197
security@ubuntu.comhttp://www.novell.com/linux/security/advisories/2008_13_sr.html
security@ubuntu.comhttp://www.redhat.com/support/errata/RHSA-2008-0238.html
security@ubuntu.comhttp://www.redhat.com/support/errata/RHSA-2008-0239.html
security@ubuntu.comhttp://www.redhat.com/support/errata/RHSA-2008-0240.html
security@ubuntu.comhttp://www.redhat.com/support/errata/RHSA-2008-0262.html
security@ubuntu.comhttp://www.securityfocus.com/bid/28830
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-603-1
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-603-2
security@ubuntu.comhttp://www.vupen.com/english/advisories/2008/1265/references
security@ubuntu.comhttp://www.vupen.com/english/advisories/2008/1266/references
security@ubuntu.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41884
security@ubuntu.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226
security@ubuntu.comhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29816
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29834
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29836
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29851
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29853
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29868
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29869
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29884
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29885
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30019
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30033
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30717
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31035
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-18.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019893
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1548Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1606
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:089
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:173
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:197
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2008_13_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0238.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0239.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0240.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0262.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28830
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-603-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-603-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1265/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1266/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41884
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "310194C7-8370-4EB6-B4CF-C8EE2A8E55DF",
              "versionEndIncluding": "0.7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E23EBF88-10DE-4EA6-9F0E-F33C88541F65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F75CFD-3523-4017-992C-4FA6406D49F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB116A19-6436-40BE-B5C6-32C22D888B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4C1429-593B-47B6-AC84-832F2296FAB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18240BA6-3390-4925-AC25-DA4C42397CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3090A142-2240-4A8D-A122-C037931A277C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD63240-4599-4212-8AF2-7C4089CA9D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7EE965-EE3F-4B17-AF38-FA3AA0B11164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE488E5-B3D9-4723-ABBA-A8753EC2DA2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1259C59E-517F-40BE-8BA6-01AB76257C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "576152B4-9ACD-4C4E-B423-4A5EF44332D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "322F9E62-6A74-4805-8F6B-9C61739B2D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C453F-6A87-49FB-83F6-22316F28161F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F532F0-6653-4275-A85A-BD9A9A611E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC7300E-0CBE-47FD-A241-B4B4F0164EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "255102DA-A2C0-4795-9539-B4CBD587554A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "349B06F1-772A-4A12-A7B9-EA220ED96D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B779800A-FF4B-47DD-B56F-77D10D6A335C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B304657-740A-4F8D-99CD-22E283FEE6F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "178680C2-DB1B-4250-9B6E-6ADABA60DE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCA9036F-92DA-45C2-9FBC-DE03444D34F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6855B98-DAA2-4850-A765-2F4D6D93A424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4743EC55-B61D-4C1A-9ED7-060268F2DB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD4454E-3D2B-4582-B5E5-0317A6417654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96402B67-A7A8-44E3-914E-A10A69FAD735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C608C8-F382-4D6B-A638-98763C1CBB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F0F4E0-91B7-4B1F-BFA9-829101A7F90A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n CairoFont::create en CairoFontEngine.cc de Poppler, posiblemente anterior a 0.8.0, como se usa en Xpdf, Evince, ePDFview, KWord y otras aplicaciones, no maneja correctamente fuentes embebidas en archivos PDF, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un objeto fuente manipulado, relacionado con referenciar un puntero de una funci\u00f3n asociado con el tipo de este objeto fuente."
    }
  ],
  "id": "CVE-2008-1693",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-18T15:05:00.000",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29816"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29834"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29836"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29851"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29853"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29868"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29869"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29884"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/29885"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/30019"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/30033"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/30717"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/31035"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://security.gentoo.org/glsa/glsa-200804-18.xml"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://securitytracker.com/id?1019893"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1548"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.debian.org/security/2008/dsa-1606"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:089"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:173"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:197"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.novell.com/linux/security/advisories/2008_13_sr.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0238.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0239.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0240.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0262.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.securityfocus.com/bid/28830"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/usn-603-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/usn-603-2"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.vupen.com/english/advisories/2008/1265/references"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.vupen.com/english/advisories/2008/1266/references"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41884"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-18.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2008_13_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0238.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0239.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0240.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0262.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-603-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-603-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1265/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1266/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…