First published: Thu Jul 04 2019(Updated: )
In Xpdf 4.01.01, a heap-based buffer overflow could be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service, an information leak, or possibly unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Glyph & Cog XpdfReader | =4.01.01 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13281 is a vulnerability in Xpdf 4.01.01 that allows a heap-based buffer overflow to be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory.
CVE-2019-13281 can be triggered by sending a crafted PDF document to the pdftotext tool in Xpdf 4.01.01.
The severity of CVE-2019-13281 is high with a CVSS base score of 7.8.
Glyphandcog Xpdfreader 4.01.01, Fedoraproject Fedora 29, Fedoraproject Fedora 30, and Fedoraproject Fedora 31 are all affected by CVE-2019-13281.
To mitigate CVE-2019-13281, update Xpdfreader to version 4.01.02 or later.