CVE-2007-3387

Description

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.

Category

6.8
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 8.73% Top 10%
Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory debian.org Vendor Advisory novell.com Vendor Advisory mandriva.com Vendor Advisory mandriva.com Vendor Advisory mandriva.com Vendor Advisory debian.org Vendor Advisory debian.org Vendor Advisory debian.org Vendor Advisory gentoo.org Vendor Advisory debian.org Vendor Advisory ubuntu.com Vendor Advisory mandriva.com Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory slackware.com Vendor Advisory mandriva.com Vendor Advisory mandriva.com Vendor Advisory debian.org Vendor Advisory gentoo.org Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory mandriva.com Vendor Advisory slackware.org Vendor Advisory mandriva.com Vendor Advisory gentoo.org Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory debian.org Vendor Advisory redhat.com Vendor Advisory sgi.com Vendor Advisory novell.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.redhat.com/support/errata/RHSA-2007-0730.html third party advisory vendor advisory
http://www.ubuntu.com/usn/usn-496-1 third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1355 third party advisory vendor advisory
http://www.vupen.com/english/advisories/2007/2705 permissions required vdb entry third party advisory
http://www.novell.com/linux/security/advisories/2007_16_sr.html vendor advisory broken link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164 third party advisory vendor advisory
https://issues.rpath.com/browse/RPL-1596 broken link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:165 third party advisory vendor advisory
http://secunia.com/advisories/26307 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:158 third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1350 third party advisory vendor advisory
http://www.securityfocus.com/archive/1/476519/30/5400/threaded mailing list vdb entry third party advisory
http://secunia.com/advisories/26468 third party advisory
http://www.securityfocus.com/archive/1/476508/100/0/threaded mailing list vdb entry third party advisory
http://secunia.com/advisories/26982 third party advisory
http://secunia.com/advisories/26254 third party advisory
http://secunia.com/advisories/26370 third party advisory
http://www.debian.org/security/2007/dsa-1348 third party advisory vendor advisory
http://secunia.com/advisories/26325 third party advisory
http://secunia.com/advisories/26413 third party advisory
http://www.debian.org/security/2007/dsa-1352 third party advisory vendor advisory
http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1354 third party advisory vendor advisory
https://issues.rpath.com/browse/RPL-1604 broken link
http://sourceforge.net/project/shownotes.php?release_id=535497 broken link
http://www.ubuntu.com/usn/usn-496-2 third party advisory vendor advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:163 third party advisory vendor advisory
http://www.kde.org/info/security/advisory-20070730-1.txt third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0731.html third party advisory vendor advisory
http://osvdb.org/40127 vdb entry broken link
http://secunia.com/advisories/26862 third party advisory
http://security.gentoo.org/glsa/glsa-200805-13.xml third party advisory vendor advisory
http://secunia.com/advisories/26281 third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0720.html third party advisory vendor advisory
http://security.gentoo.org/glsa/glsa-200709-12.xml third party advisory vendor advisory
http://www.securityfocus.com/bid/25124 vdb entry third party advisory
http://secunia.com/advisories/26514 third party advisory
http://secunia.com/advisories/26467 third party advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882 third party advisory vendor advisory
http://secunia.com/advisories/26432 third party advisory
http://secunia.com/advisories/26410 third party advisory
http://bugs.gentoo.org/show_bug.cgi?id=187139 issue tracking third party advisory
http://secunia.com/advisories/26607 third party advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm third party advisory
http://secunia.com/advisories/30168 third party advisory
http://secunia.com/advisories/26358 third party advisory
http://secunia.com/advisories/26365 third party advisory
http://secunia.com/advisories/26627 third party advisory
http://secunia.com/advisories/26293 third party advisory
http://secunia.com/advisories/26283 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:159 third party advisory vendor advisory
http://secunia.com/advisories/27308 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:160 third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1357 third party advisory vendor advisory
http://security.gentoo.org/glsa/glsa-200709-17.xml third party advisory vendor advisory
http://secunia.com/advisories/26403 third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0732.html third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1349 third party advisory vendor advisory
http://secunia.com/advisories/26251 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149 vdb entry third party advisory signature
http://secunia.com/advisories/26292 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:161 third party advisory vendor advisory
http://secunia.com/advisories/26342 third party advisory
http://secunia.com/advisories/26257 third party advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194 issue tracking third party advisory
http://secunia.com/advisories/26395 third party advisory
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670 third party advisory vendor advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:162 third party advisory vendor advisory
http://security.gentoo.org/glsa/glsa-200711-34.xml third party advisory vendor advisory
http://www.securitytracker.com/id?1018473 vdb entry third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0729.html third party advisory vendor advisory
http://secunia.com/advisories/26188 third party advisory
http://secunia.com/advisories/26278 third party advisory
http://secunia.com/advisories/26425 third party advisory
http://security.gentoo.org/glsa/glsa-200710-20.xml third party advisory vendor advisory
http://www.vupen.com/english/advisories/2007/2704 permissions required vdb entry third party advisory
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch broken link
http://www.debian.org/security/2007/dsa-1347 third party advisory vendor advisory
http://www.redhat.com/support/errata/RHSA-2007-0735.html third party advisory vendor advisory
http://www.securityfocus.com/archive/1/476765/30/5340/threaded mailing list vdb entry third party advisory
http://secunia.com/advisories/27281 third party advisory
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc vendor advisory broken link
https://issues.foresightlinux.org/browse/FL-471 broken link
http://secunia.com/advisories/26436 third party advisory
http://secunia.com/advisories/26343 third party advisory
http://secunia.com/advisories/26407 third party advisory
http://secunia.com/advisories/26255 third party advisory
http://secunia.com/advisories/27156 third party advisory
http://secunia.com/advisories/26318 third party advisory
http://secunia.com/advisories/26470 third party advisory
http://www.novell.com/linux/security/advisories/2007_15_sr.html vendor advisory broken link
http://secunia.com/advisories/26297 third party advisory
http://secunia.com/advisories/26405 third party advisory
http://secunia.com/advisories/27637 third party advisory

Frequently Asked Questions

What is the severity of CVE-2007-3387?
CVE-2007-3387 has been scored as a medium severity vulnerability.
How to fix CVE-2007-3387?
To fix CVE-2007-3387, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-3387 being actively exploited in the wild?
It is possible that CVE-2007-3387 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~9% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.