First published: Fri Dec 25 2020(Updated: )
** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Utilities | =20.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35702 is a vulnerability in Poppler 20.12.1 that allows a crafted PDF document to cause a heap-based buffer overflow in the DCTStream::getChars function in DCTStream.cc.
CVE-2020-35702 has a severity rating of 7.8 (high).
Poppler 20.12.1 is affected by CVE-2020-35702.
CVE-2020-35702 can be exploited by using a crafted PDF document.
The fix for CVE-2020-35702 is available in later builds of Poppler git clones from late December 2020.