Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2642

Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.158
EPSS Ranking 94.3%
CVSS Severity
CVSS v2 Score 7.6
References
Products affected by CVE-2010-2642
  • Redhat » Evince » Version: Any
    cpe:2.3:a:redhat:evince:*
  • Redhat » Evince » Version: 0.1
    cpe:2.3:a:redhat:evince:0.1
  • Redhat » Evince » Version: 0.2
    cpe:2.3:a:redhat:evince:0.2
  • Redhat » Evince » Version: 0.3
    cpe:2.3:a:redhat:evince:0.3
  • Redhat » Evince » Version: 0.4
    cpe:2.3:a:redhat:evince:0.4
  • Redhat » Evince » Version: 0.5
    cpe:2.3:a:redhat:evince:0.5
  • Redhat » Evince » Version: 0.6
    cpe:2.3:a:redhat:evince:0.6
  • Redhat » Evince » Version: 0.7
    cpe:2.3:a:redhat:evince:0.7
  • Redhat » Evince » Version: 0.8
    cpe:2.3:a:redhat:evince:0.8
  • Redhat » Evince » Version: 0.9
    cpe:2.3:a:redhat:evince:0.9
  • Redhat » Evince » Version: 2.19
    cpe:2.3:a:redhat:evince:2.19
  • Redhat » Evince » Version: 2.20
    cpe:2.3:a:redhat:evince:2.20
  • Redhat » Evince » Version: 2.21
    cpe:2.3:a:redhat:evince:2.21
  • Redhat » Evince » Version: 2.22
    cpe:2.3:a:redhat:evince:2.22
  • Redhat » Evince » Version: 2.23
    cpe:2.3:a:redhat:evince:2.23
  • Redhat » Evince » Version: 2.24
    cpe:2.3:a:redhat:evince:2.24
  • Redhat » Evince » Version: 2.25
    cpe:2.3:a:redhat:evince:2.25
  • Redhat » Evince » Version: 2.26
    cpe:2.3:a:redhat:evince:2.26
  • Redhat » Evince » Version: 2.27
    cpe:2.3:a:redhat:evince:2.27
  • Redhat » Evince » Version: 2.28
    cpe:2.3:a:redhat:evince:2.28
  • Redhat » Evince » Version: 2.29
    cpe:2.3:a:redhat:evince:2.29
  • Redhat » Evince » Version: 2.29.92
    cpe:2.3:a:redhat:evince:2.29.92
  • Redhat » Evince » Version: 2.30
    cpe:2.3:a:redhat:evince:2.30
  • Redhat » Evince » Version: 2.30.2
    cpe:2.3:a:redhat:evince:2.30.2
  • Redhat » Evince » Version: 2.30.3
    cpe:2.3:a:redhat:evince:2.30.3
  • Redhat » Evince » Version: 2.31
    cpe:2.3:a:redhat:evince:2.31
  • Redhat » Evince » Version: 2.31.1
    cpe:2.3:a:redhat:evince:2.31.1
  • Redhat » Evince » Version: 2.31.2
    cpe:2.3:a:redhat:evince:2.31.2
  • Redhat » Evince » Version: 2.31.4
    cpe:2.3:a:redhat:evince:2.31.4
  • Redhat » Evince » Version: 2.31.4.1
    cpe:2.3:a:redhat:evince:2.31.4.1
  • Redhat » Evince » Version: 2.31.6
    cpe:2.3:a:redhat:evince:2.31.6
  • Redhat » Evince » Version: 2.31.6.1
    cpe:2.3:a:redhat:evince:2.31.6.1
  • Redhat » Evince » Version: 2.31.90
    cpe:2.3:a:redhat:evince:2.31.90
  • Redhat » Evince » Version: 2.31.92
    cpe:2.3:a:redhat:evince:2.31.92
  • T1lib » T1lib » Version: 5.1.2
    cpe:2.3:a:t1lib:t1lib:5.1.2
  • Tug » Tetex » Version: 3.0
    cpe:2.3:a:tug:tetex:3.0


Contact Us

Shodan ® - All rights reserved