First published: Mon Sep 03 2018(Updated: )
SplashXPath::strokeAdjust in splash/SplashXPath.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf | =4.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16368 has been classified as a high severity vulnerability due to its potential to cause denial of service.
The recommended fix for CVE-2018-16368 is to upgrade Xpdf to version 4.01 or later.
CVE-2018-16368 allows remote attackers to exploit a heap-based buffer over-read leading to a denial of service.
CVE-2018-16368 specifically affects Xpdf version 4.00.
CVE-2018-16368 is exploited by processing a crafted PDF file that triggers the vulnerability in the SplashXPath::strokeAdjust function.