First published: Mon Oct 02 2017(Updated: )
The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/poppler | 0.71.0-5 0.71.0-5+deb10u3 20.09.0-3.1+deb11u1 22.12.0-2 | |
Poppler Utilities | =0.59.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14976 is categorized as a high severity vulnerability due to its potential to cause denial of service attacks.
To remediate CVE-2017-14976, upgrade Poppler to version 0.71.0 or later, or the appropriate patched version for your Debian release.
CVE-2017-14976 specifically affects Poppler version 0.59.0.
CVE-2017-14976 is a heap-based buffer over-read vulnerability.
Yes, CVE-2017-14976 can potentially be exploited remotely to launch a denial of service attack.