First published: Thu Jun 22 2017(Updated: )
Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/poppler | 0.71.0-5 0.71.0-5+deb10u3 20.09.0-3.1+deb11u1 22.12.0-2 | |
Poppler Data | <=0.55.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9776 has been classified as a vulnerability with the potential to cause a denial of service and possibly other unspecified impacts.
To fix CVE-2017-9776, update the Poppler package to versions 0.71.0-5 or later, as recommended by your operating system vendor.
CVE-2017-9776 is an integer overflow vulnerability that leads to a heap buffer overflow.
CVE-2017-9776 affects versions of the Poppler library prior to 0.56, and various distributions of Debian and Red Hat Enterprise Linux.
Yes, CVE-2017-9776 can be exploited remotely through a crafted PDF document.