CVE-2010-2575
Published Aug 30, 2010
Last updated 6 years ago
Overview
- Description
- Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32EB3F1E-9745-4D31-AC8B-B85418A9215E" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096EA629-5CA5-42B6-B6BF-9B401623D411" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B411BAA5-A57C-43D7-B99D-BBF90AAA0867" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "939121D6-2E82-4E9C-8D2E-753A48A2DBAC" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B67C346-02AA-4719-BFD1-D6D5357B2C74" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FD07C23-B63D-43A1-9930-B04938CE2A88" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0D84A35-4355-4BBB-BC67-A455EDC8A213" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "376563D6-9847-4596-8E7F-A1B4E4437DA9" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF01B401-CDAF-4853-B582-EC13A352A4B2" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59FFB800-D27D-4B7F-A895-C757B18B3201" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BE342C5-6E49-4755-BC09-FAA51523199C" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7F5F040-4B36-45FA-B730-98E4F0BB59BF" }, { "criteria": "cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F4D61AB-0779-4D26-8024-8A3826D92D0F" } ], "operator": "OR" } ] } ]