{"vuid":"VU#376500","idnumber":"376500","name":"Foolabs Xpdf contains a denial of service vulnerability","keywords":["xpdf","denial-of-service"],"overview":"Foolabs Xpdf contains a denial of service vulnerability caused by the t1lib library incorrectly parsing Type 1 fonts.","clean_desc":"According to Foolabs: Xpdf is an open source viewer for Portable Document Format (PDF) files. (These are sometimes also called 'Acrobat' files, from the name of Adobe's PDF software.) The Xpdf project also includes a PDF text extractor, PDF-to-PostScript converter, and various other utilities. Foolabs Xpdf contains a denial of service vulnerability caused by the t1lib library incorrectly parsing Type 1 fonts. This vulnerability may allow an attacker to execute arbitrary code.","impact":"A remote attacker can cause the device to crash and may be able to execute arbitrary code.","resolution":"The vendor has stated they will stop using t1lib in their product and users should build Xpdf without t1lib. To build Xpdf without t1lib, add the \"--with-t1-library=no\" flag to the\nconfigure command: ./configure --with-t1-library=no ..... To double-check, run \"xpdf --help\". The \"-freetype\" option should be\nlisted, and the \"-t1lib\" option should NOT be listed. That indicates\nthat Xpdf was built with FreeType and without t1lib. With this setting, Xpdf will use FreeType instead of t1lib to rasterize\nType 1 fonts. With recent versions of FreeType, the Type 1 quality is\nas good or better than t1lib, so this should not present any problems.","workarounds":"","sysaffected":"","thanks":"Thanks to Jonathan Brossard for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","t","o","u","c","a","n","-","s","y","s","t","e","m",".","e","u","/","a","d","v","i","s","o","r","i","e","s","/","t","s","s","a","-","2","0","1","1","-","0","1",".","t","x","t"],"cveids":["CVE-2011-0764"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-01-10T19:16:36Z","publicdate":"2011-03-21T00:00:00Z","datefirstpublished":"2011-03-21T13:04:12Z","dateupdated":"2011-04-05T13:44:24Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"10","cam_impact":"11","cam_easeofexploitation":"2","cam_attackeraccessrequired":"5","cam_scorecurrent":"0.061875","cam_scorecurrentwidelyknown":"0.45375","cam_scorecurrentwidelyknownexploited":"0.86625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.061875,"vulnote":null}