First published: Tue Feb 13 2018(Updated: )
An issue was discovered in QPDF before 7.0.0. There is a large heap-based out-of-bounds read in the Pl_Buffer::write function in Pl_Buffer.cc. It is caused by an integer overflow in the PNG filter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <8.0.2-3~14.04.1 | 8.0.2-3~14.04.1 |
ubuntu/qpdf | <7.0.0-1 | 7.0.0-1 |
ubuntu/qpdf | <8.0.2-3~16.04.1 | 8.0.2-3~16.04.1 |
debian/qpdf | 10.1.0-1 11.3.0-1+deb12u1 11.9.1-1 | |
qpdf | <7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18185 has been classified as a high severity vulnerability due to its large heap-based out-of-bounds read potential.
To fix CVE-2017-18185, update QPDF to version 7.0.0 or later, or to specific secure versions like 8.0.2-3~14.04.1 for Ubuntu.
CVE-2017-18185 affects QPDF versions prior to 7.0.0.
CVE-2017-18185 is a heap-based out-of-bounds read vulnerability caused by an integer overflow in the PNG filter.
If you cannot update, you should apply security best practices and mitigate potential exploits by restricting access to the vulnerable software.