First published: Fri May 19 2017(Updated: )
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
freedesktop poppler | =0.54.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9083 is considered to have a high severity due to its potential to cause a segmentation fault in vulnerable applications.
To fix CVE-2017-9083, update Poppler to a version later than 0.54.0 that has addressed this vulnerability.
CVE-2017-9083 specifically affects Poppler version 0.54.0.
Applications such as Evince and utilities like perf_test are impacted by CVE-2017-9083 due to their use of the vulnerable Poppler library.
CVE-2017-9083 is a NULL pointer dereference vulnerability in the JPXStream::readUByte function, leading to application crashes when invalid PDF files are processed.