Description
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Published: 2007-11-08
Score: 7.6 High
EPSS: 25.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1480-1 New poppler packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1509-1 New koffice packages fix multiple vulnerabilities
Debian DSA Debian DSA DSA-1537-1 New xpdf packages fix multiple vulnerabilities
Ubuntu USN Ubuntu USN USN-542-1 poppler vulnerabilities
Ubuntu USN Ubuntu USN USN-542-2 KOffice vulnerabilities
References
Link Providers
http://secunia.com/advisories/26503 cve-icon cve-icon
http://secunia.com/advisories/27260 cve-icon cve-icon
http://secunia.com/advisories/27553 cve-icon cve-icon
http://secunia.com/advisories/27573 cve-icon cve-icon
http://secunia.com/advisories/27574 cve-icon cve-icon
http://secunia.com/advisories/27575 cve-icon cve-icon
http://secunia.com/advisories/27577 cve-icon cve-icon
http://secunia.com/advisories/27578 cve-icon cve-icon
http://secunia.com/advisories/27599 cve-icon cve-icon
http://secunia.com/advisories/27615 cve-icon cve-icon
http://secunia.com/advisories/27618 cve-icon cve-icon
http://secunia.com/advisories/27619 cve-icon cve-icon
http://secunia.com/advisories/27632 cve-icon cve-icon
http://secunia.com/advisories/27634 cve-icon cve-icon
http://secunia.com/advisories/27636 cve-icon cve-icon
http://secunia.com/advisories/27637 cve-icon cve-icon
http://secunia.com/advisories/27640 cve-icon cve-icon
http://secunia.com/advisories/27641 cve-icon cve-icon
http://secunia.com/advisories/27642 cve-icon cve-icon
http://secunia.com/advisories/27645 cve-icon cve-icon
http://secunia.com/advisories/27656 cve-icon cve-icon
http://secunia.com/advisories/27658 cve-icon cve-icon
http://secunia.com/advisories/27705 cve-icon cve-icon
http://secunia.com/advisories/27721 cve-icon cve-icon
http://secunia.com/advisories/27724 cve-icon cve-icon
http://secunia.com/advisories/27743 cve-icon cve-icon
http://secunia.com/advisories/27856 cve-icon cve-icon
http://secunia.com/advisories/28043 cve-icon cve-icon
http://secunia.com/advisories/28812 cve-icon cve-icon
http://secunia.com/advisories/29104 cve-icon cve-icon
http://secunia.com/advisories/29604 cve-icon cve-icon
http://secunia.com/advisories/30168 cve-icon cve-icon
http://secunia.com/secunia_research/2007-88/advisory/ cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200711-22.xml cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200711-34.xml cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200805-13.xml cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882 cve-icon cve-icon
http://support.novell.com/techcenter/psdb/1d5fd29802b2ef7e342e733731f1e933.html cve-icon cve-icon
http://support.novell.com/techcenter/psdb/3867a5092daac43cd6a92e6107d9fbce.html cve-icon cve-icon
http://support.novell.com/techcenter/psdb/43ad7b3569dba59e7ba07677edc01cad.html cve-icon cve-icon
http://support.novell.com/techcenter/psdb/da3498f05433976cc548cc4eaf8349c8.html cve-icon cve-icon
http://support.novell.com/techcenter/psdb/f83e024a65d69ebc810d2117815b940d.html cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1480 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1509 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1537 cve-icon cve-icon
http://www.kde.org/info/security/advisory-20071107-1.txt cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:219 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:220 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:221 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:222 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:223 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:227 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:228 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:230 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_60_pdf.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1021.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1022.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1024.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1025.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1026.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1027.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1029.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1030.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/483372 cve-icon cve-icon
http://www.securityfocus.com/bid/26367 cve-icon cve-icon
http://www.securitytracker.com/id?1018905 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-542-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-542-2 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3774 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3775 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3776 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3779 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3786 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/38306 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1926 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-4352 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9979 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-4352 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html cve-icon cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux
Xpdf Xpdf
cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T14:53:55.890Z

Reserved: 2007-08-14T00:00:00.000Z

Link: CVE-2007-4352

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-11-08T02:46:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-4352

cve-icon Redhat

Severity : Important

Publid Date: 2007-11-07T00:00:00Z

Links: CVE-2007-4352 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses