CVE-2007-0104

N/A Unknown
Published: January 09, 2007 Modified: April 23, 2026
View on NVD

Description

The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/23799
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23808
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23813
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23815
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23839
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23844
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23876
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/24204
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/24479
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/21910
Source: cve@mitre.org
Exploit
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2007/0203
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0212
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0244
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0930
Source: cve@mitre.org
Vendor Advisory
http://docs.info.apple.com/article.html?artnum=305214
Source: af854a3a-2127-422b-91ae-364da2661108
http://projects.info-pull.com/moab/MOAB-06-01-2007.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23791
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23799
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23808
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23813
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23815
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23839
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23844
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23876
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24204
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24479
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1017514
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kde.org/info/security/advisory-20070115-1.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2007_3_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/457055/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/21910
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securitytracker.com/id?1017749
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-410-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-410-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2007/0203
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0212
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0244
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0930
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-964
Source: af854a3a-2127-422b-91ae-364da2661108

68 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
19.0%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

kde xpdf