First published: Thu Jul 04 2019(Updated: )
In Xpdf 4.01.01, there is a use-after-free vulnerability in the function JBIG2Stream::close() located at JBIG2Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Glyph & Cog XpdfReader | =4.01.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13289 is classified as a high severity vulnerability due to its potential to lead to arbitrary code execution.
CVE-2019-13289 occurs due to a use-after-free vulnerability in the JBIG2Stream::close() function when handling crafted PDF documents.
CVE-2019-13289 affects users of Xpdf version 4.01.01, which is a PDF rendering tool.
To fix CVE-2019-13289, you should upgrade to the latest version of Xpdf that includes security patches addressing this vulnerability.
Yes, CVE-2019-13289 can be exploited remotely by sending a crafted PDF document to the vulnerable tool, potentially allowing an attacker to execute arbitrary code.