FKIE_CVE-2012-6535

Vulnerability from fkie_nvd - Published: 2013-12-02 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
DjVuLibre before 3.5.25.3, as used in Evince, Sumatra PDF Reader, VuDroid, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted DjVu (aka .djv) file.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA87C7B-9840-4E15-B7F1-0B05E36FD246",
              "versionEndIncluding": "3.5.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C27FAE-0DE5-4DF8-9670-285028E91775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0B7483-8F78-48D6-AFDC-2B3A8A076EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B4C390-721E-4377-92AC-91B64554F89E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF4E03-5F26-4EDA-B886-96A1552F70A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FB8935-44C7-4DD4-BCCF-9F66C80A329D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4B79E01-6647-40A1-8FC6-1993EEF58191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE11923-2CB8-4922-A4A5-0B46C4960EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "10069FBB-4A34-4F32-A85C-077F82F51BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5ECBC4E-FA3E-49E2-93C9-D21A9AD82DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6431C3D-A705-4917-9CC2-983E7974ABFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB06FA7D-7638-40A9-BD8E-8D0FE7B35832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F17CDD-DFFA-4130-8E71-C8D2255D1980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC88B173-0EB2-4A8B-8C8E-D682D7116901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16E6D4C-928B-442D-8F91-2ADDA89FE34C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1C5E2C-69F5-400D-A486-EF102013791F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D0E4F5-F8F6-4618-B8AC-E8F25DEEB3BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "816FBFA2-F482-44DA-84C5-D61FDF1F681D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0684F4FD-45B8-4128-AC74-D28324B3BF10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAA7EA8-C5C1-47A6-8E1A-4166A519BE2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F93407-E502-4C2F-93B4-591C5A5DA500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC55927F-67AE-45AE-8438-C44929D9E666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B035269-D67C-4957-8E87-34555E58A14A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6780F4-B81E-4796-AE3C-FC3C99880470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "267B163B-0457-41FB-B9FC-9D88E21D5623",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "DjVuLibre before 3.5.25.3, as used in Evince, Sumatra PDF Reader, VuDroid, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted DjVu (aka .djv) file."
    },
    {
      "lang": "es",
      "value": "DjVuLibre anterior a la versi\u00f3n 3.5.25.3, tal y como se usa en Evince, Sumatra PDF Reader, VuDroid, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo DjVu manipulado (tambi\u00e9n conocido como .djv)."
    }
  ],
  "id": "CVE-2012-6535",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-12-02T22:55:03.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://technet.microsoft.com/security/msvr/msvr13-004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2014/dsa-2844"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2056-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://technet.microsoft.com/security/msvr/msvr13-004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2056-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…