7.8
CWE
787 119
Advisory Published
Updated

CVE-2020-35702: Buffer Overflow

First published: Fri Dec 25 2020(Updated: )

** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
freedesktop poppler=20.12.1
=20.12.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-35702?

    CVE-2020-35702 is a vulnerability in Poppler 20.12.1 that allows a crafted PDF document to cause a heap-based buffer overflow in the DCTStream::getChars function in DCTStream.cc.

  • How severe is CVE-2020-35702?

    CVE-2020-35702 has a severity rating of 7.8 (high).

  • Which software versions are affected by CVE-2020-35702?

    Poppler 20.12.1 is affected by CVE-2020-35702.

  • How can CVE-2020-35702 be exploited?

    CVE-2020-35702 can be exploited by using a crafted PDF document.

  • Is there a fix available for CVE-2020-35702?

    The fix for CVE-2020-35702 is available in later builds of Poppler git clones from late December 2020.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203