Vulnerability CVE-2011-1552: Information

Description

t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.

Severity: MEDIUM (4.3)

Published: April 1, 2011
Modified: March 6, 2019
Error type identifier: CWE-119

Fixed packages

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*

      cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*