FKIE_CVE-2012-6535
Vulnerability from fkie_nvd - Published: 2013-12-02 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
DjVuLibre before 3.5.25.3, as used in Evince, Sumatra PDF Reader, VuDroid, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted DjVu (aka .djv) file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| djvulibre_project | djvulibre | * | |
| djvulibre_project | djvulibre | 3.5.1 | |
| djvulibre_project | djvulibre | 3.5.2 | |
| djvulibre_project | djvulibre | 3.5.3 | |
| djvulibre_project | djvulibre | 3.5.4 | |
| djvulibre_project | djvulibre | 3.5.5 | |
| djvulibre_project | djvulibre | 3.5.6 | |
| djvulibre_project | djvulibre | 3.5.7 | |
| djvulibre_project | djvulibre | 3.5.8 | |
| djvulibre_project | djvulibre | 3.5.9 | |
| djvulibre_project | djvulibre | 3.5.10 | |
| djvulibre_project | djvulibre | 3.5.11 | |
| djvulibre_project | djvulibre | 3.5.12 | |
| djvulibre_project | djvulibre | 3.5.13 | |
| djvulibre_project | djvulibre | 3.5.14 | |
| djvulibre_project | djvulibre | 3.5.15 | |
| djvulibre_project | djvulibre | 3.5.16 | |
| djvulibre_project | djvulibre | 3.5.17 | |
| djvulibre_project | djvulibre | 3.5.18 | |
| djvulibre_project | djvulibre | 3.5.19 | |
| djvulibre_project | djvulibre | 3.5.20 | |
| djvulibre_project | djvulibre | 3.5.21 | |
| djvulibre_project | djvulibre | 3.5.22 | |
| djvulibre_project | djvulibre | 3.5.23 | |
| djvulibre_project | djvulibre | 3.5.24 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA87C7B-9840-4E15-B7F1-0B05E36FD246",
"versionEndIncluding": "3.5.25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "74C27FAE-0DE5-4DF8-9670-285028E91775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0B7483-8F78-48D6-AFDC-2B3A8A076EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "30B4C390-721E-4377-92AC-91B64554F89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEF4E03-5F26-4EDA-B886-96A1552F70A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FB8935-44C7-4DD4-BCCF-9F66C80A329D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B79E01-6647-40A1-8FC6-1993EEF58191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE11923-2CB8-4922-A4A5-0B46C4960EFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "10069FBB-4A34-4F32-A85C-077F82F51BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D5ECBC4E-FA3E-49E2-93C9-D21A9AD82DF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D6431C3D-A705-4917-9CC2-983E7974ABFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FB06FA7D-7638-40A9-BD8E-8D0FE7B35832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "04F17CDD-DFFA-4130-8E71-C8D2255D1980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CC88B173-0EB2-4A8B-8C8E-D682D7116901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A16E6D4C-928B-442D-8F91-2ADDA89FE34C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1C5E2C-69F5-400D-A486-EF102013791F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "39D0E4F5-F8F6-4618-B8AC-E8F25DEEB3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "816FBFA2-F482-44DA-84C5-D61FDF1F681D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "0684F4FD-45B8-4128-AC74-D28324B3BF10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2BAA7EA8-C5C1-47A6-8E1A-4166A519BE2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "66F93407-E502-4C2F-93B4-591C5A5DA500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "EC55927F-67AE-45AE-8438-C44929D9E666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1B035269-D67C-4957-8E87-34555E58A14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6780F4-B81E-4796-AE3C-FC3C99880470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "267B163B-0457-41FB-B9FC-9D88E21D5623",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DjVuLibre before 3.5.25.3, as used in Evince, Sumatra PDF Reader, VuDroid, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted DjVu (aka .djv) file."
},
{
"lang": "es",
"value": "DjVuLibre anterior a la versi\u00f3n 3.5.25.3, tal y como se usa en Evince, Sumatra PDF Reader, VuDroid, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo DjVu manipulado (tambi\u00e9n conocido como .djv)."
}
],
"id": "CVE-2012-6535",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-12-02T22:55:03.240",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://technet.microsoft.com/security/msvr/msvr13-004"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2014/dsa-2844"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2056-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://technet.microsoft.com/security/msvr/msvr13-004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2844"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2056-1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…