First published: Thu Apr 08 2021(Updated: )
A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call among PdfTokenizer::ReadArray(), PdfTokenizer::GetNextVariant() and PdfTokenizer::ReadDataType() functions can lead to a stack overflow.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libpodofo | <=0.9.7+dfsg-2<=0.9.8+dfsg-3<=0.9.8+dfsg-3.2 | |
PoDoFo | =0.9.7 | |
Red Hat Enterprise Linux | =7.0 | |
Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30470 has a medium severity rating due to the potential for a stack overflow vulnerability.
CVE-2021-30470 affects versions of PoDoFo up to 0.9.7 and versions of libpodofo in Debian, as well as specific versions on Red Hat Enterprise Linux and Fedora.
To fix CVE-2021-30470, you should upgrade to the latest version of PoDoFo and ensure that your package manager has the updated libpodofo.
The risk associated with CVE-2021-30470 is that an attacker could exploit the stack overflow to execute arbitrary code or crash the application.
Yes, CVE-2021-30470 can potentially be exploited remotely if a malicious PDF is processed by vulnerable versions of the affected software.