CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
93.6%
Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | evince | * | cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:* |
redhat | evince | 0.1 | cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:* |
redhat | evince | 0.2 | cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:* |
redhat | evince | 0.3 | cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:* |
redhat | evince | 0.4 | cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:* |
redhat | evince | 0.5 | cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:* |
redhat | evince | 0.6 | cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:* |
redhat | evince | 0.7 | cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:* |
redhat | evince | 0.8 | cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:* |
redhat | evince | 0.9 | cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:* |
git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2
lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html
lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html
lists.mandriva.com/security-announce/2011-01/msg00006.php
lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
secunia.com/advisories/42769
secunia.com/advisories/42821
secunia.com/advisories/42847
secunia.com/advisories/42872
secunia.com/advisories/43068
www.debian.org/security/2011/dsa-2357
www.redhat.com/support/errata/RHSA-2011-0009.html
www.securityfocus.com/bid/45678
www.securitytracker.com/id?1024937
www.ubuntu.com/usn/USN-1035-1
www.vupen.com/english/advisories/2011/0029
www.vupen.com/english/advisories/2011/0043
www.vupen.com/english/advisories/2011/0056
www.vupen.com/english/advisories/2011/0097
www.vupen.com/english/advisories/2011/0102
www.vupen.com/english/advisories/2011/0212
bugzilla.redhat.com/show_bug.cgi?id=666313