CVE-2010-2575

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file.

References

http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046448.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046524.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046542.html

http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html

http://secunia.com/advisories/40952

http://secunia.com/advisories/41086

http://secunia.com/advisories/41132

http://secunia.com/secunia_research/2010-109/

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.340142

http://www.kde.org/info/security/advisory-20100825-1.txt

http://www.mandriva.com/security/advisories?name=MDVSA-2010:162

http://www.osvdb.org/67454

http://www.securityfocus.com/archive/1/513341/100/0/threaded

http://www.ubuntu.com/usn/USN-979-1

http://www.vupen.com/english/advisories/2010/2178

http://www.vupen.com/english/advisories/2010/2179

http://www.vupen.com/english/advisories/2010/2202

http://www.vupen.com/english/advisories/2010/2206

http://www.vupen.com/english/advisories/2010/2219

http://www.vupen.com/english/advisories/2010/2230

https://bugzilla.redhat.com/show_bug.cgi?id=627289

https://exchange.xforce.ibmcloud.com/vulnerabilities/61371

Details

Source: MITRE

Published: 2010-08-30

Updated: 2018-10-10

Type: CWE-119

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
75524openSUSE Security Update : gwenview (openSUSE-SU-2010:0691-1)NessusSuSE Local Security Checks
medium
71122GLSA-201311-20 : Okular: Arbitrary code executionNessusGentoo Local Security Checks
medium
54885Slackware 13.1 : kdegraphics (SSA:2010-240-03)NessusSlackware Local Security Checks
medium
51602SuSE 11.1 Security Update : okular (SAT Patch Number 3062)NessusSuSE Local Security Checks
medium
50920SuSE 11 Security Update : okular. (SAT Patch Number 3064)NessusSuSE Local Security Checks
medium
49756openSUSE Security Update : gwenview (openSUSE-SU-2010:0691-1)NessusSuSE Local Security Checks
medium
49754openSUSE Security Update : gwenview (openSUSE-SU-2010:0691-1)NessusSuSE Local Security Checks
medium
48916Fedora 12 : kdegraphics-4.4.5-3.fc12 (2010-13661)NessusFedora Local Security Checks
medium
48915Fedora 13 : kdegraphics-4.4.5-3.fc13 (2010-13629)NessusFedora Local Security Checks
medium
48905Ubuntu 9.04 / 9.10 / 10.04 LTS : kdegraphics vulnerability (USN-979-1)NessusUbuntu Local Security Checks
medium
48898Mandriva Linux Security Advisory : kdegraphics4 (MDVSA-2010:162)NessusMandriva Local Security Checks
medium
48748Fedora 14 : kdegraphics-4.5.0-2.fc14 (2010-13589)NessusFedora Local Security Checks
medium