Poppler CVE-2013-1788 Multiple Memory Corruption Vulnerabilities

To exploit these issues, an attacker must entice an unsuspecting user to open a malicious PDF file.

The vendor has received an example PDF file from the reporter that demonstrates these issues. This file is not known to be publicly available.


 

Privacy Statement
Copyright 2010, SecurityFocus