CVE-2008-1693

N/A Unknown
Published: April 18, 2008 Modified: April 23, 2026
View on NVD

Description

The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29816
Source: security@ubuntu.com
http://secunia.com/advisories/29834
Source: security@ubuntu.com
http://secunia.com/advisories/29836
Source: security@ubuntu.com
http://secunia.com/advisories/29851
Source: security@ubuntu.com
http://secunia.com/advisories/29853
Source: security@ubuntu.com
http://secunia.com/advisories/29868
Source: security@ubuntu.com
http://secunia.com/advisories/29869
Source: security@ubuntu.com
http://secunia.com/advisories/29884
Source: security@ubuntu.com
http://secunia.com/advisories/29885
Source: security@ubuntu.com
http://secunia.com/advisories/30019
Source: security@ubuntu.com
http://secunia.com/advisories/30033
Source: security@ubuntu.com
http://secunia.com/advisories/30717
Source: security@ubuntu.com
http://secunia.com/advisories/31035
Source: security@ubuntu.com
http://securitytracker.com/id?1019893
Source: security@ubuntu.com
http://www.debian.org/security/2008/dsa-1548
Source: security@ubuntu.com
Patch
http://www.securityfocus.com/bid/28830
Source: security@ubuntu.com
http://www.ubuntu.com/usn/usn-603-1
Source: security@ubuntu.com
http://www.ubuntu.com/usn/usn-603-2
Source: security@ubuntu.com
http://secunia.com/advisories/29816
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29834
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29836
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29851
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29853
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29868
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29869
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29884
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29885
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30019
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30033
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30717
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31035
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200804-18.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1019893
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1548
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.debian.org/security/2008/dsa-1606
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:089
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:173
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:197
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2008_13_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0238.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0239.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0240.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0262.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28830
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-603-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-603-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1265/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1266/references
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41884
Source: af854a3a-2127-422b-91ae-364da2661108

68 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.6%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

poppler