{"id":"DEBIAN-CVE-2010-3702","details":"The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.","modified":"2026-03-11T06:54:36.522413Z","published":"2010-11-05T18:00:05.017Z","upstream":["CVE-2010-3702"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2010-3702"}],"affected":[{"package":{"name":"poppler","ecosystem":"Debian:11","purl":"pkg:deb/debian/poppler?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.4-1.2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"poppler","ecosystem":"Debian:12","purl":"pkg:deb/debian/poppler?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.4-1.2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"poppler","ecosystem":"Debian:13","purl":"pkg:deb/debian/poppler?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.4-1.2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"poppler","ecosystem":"Debian:14","purl":"pkg:deb/debian/poppler?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.4-1.2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"xpdf","ecosystem":"Debian:11","purl":"pkg:deb/debian/xpdf?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.02-9"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"xpdf","ecosystem":"Debian:12","purl":"pkg:deb/debian/xpdf?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.02-9"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"xpdf","ecosystem":"Debian:13","purl":"pkg:deb/debian/xpdf?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.02-9"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}},{"package":{"name":"xpdf","ecosystem":"Debian:14","purl":"pkg:deb/debian/xpdf?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.02-9"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2010-3702.json"}}],"schema_version":"1.7.5"}