First published: Mon May 27 2019(Updated: )
A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Glyph & Cog XpdfReader | =4.01.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12360 is high, with a severity value of 7.1.
The affected software for CVE-2019-12360 is Xpdf 4.01.01 (Glyphandcog Xpdfreader).
The CVE-2019-12360 vulnerability can be triggered by sending crafted TrueType data in a PDF document to the pdftops tool.
The possible impacts of CVE-2019-12360 are Denial of Service or leaking memory data into dump con...
You can find more information about CVE-2019-12360 in the following references: [Reference 1](https://forum.xpdfreader.com/viewtopic.php?f=3&t=41801), [Reference 2](https://lists.debian.org/debian-lts-announce/2019/06/msg00002.html), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJ3GYFINXANXTQEDN5SON47IJA5277RU/)