First published: Thu Jul 04 2019(Updated: )
In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in SampledFunction::transform in Function.cc when using a large index for samples. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Glyph & Cog XpdfReader | =4.01.01 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-13282 is high with a CVSS score of 7.8.
To mitigate the vulnerability, ensure you update Xpdf to a version where the issue has been patched.
The vulnerability can be triggered by using a large index for samples in SampledFunction::transform in Function.cc or by sending a crafted PDF document to the pdftotext tool.