First published: Thu Jun 29 2017(Updated: )
Poppler has a stack-based buffer overflow in GfxState.cc, which allows attackers to cause a denial of service (application crash) via a crafted PDF document. Upstream issue: <a href="https://bugs.freedesktop.org/show_bug.cgi?id=101540">https://bugs.freedesktop.org/show_bug.cgi?id=101540</a> Upstream patch: <a href="https://cgit.freedesktop.org/poppler/poppler/commit/?id=8f4ff8243a3d599ff2a6c08b1da389e606ba4fc9">https://cgit.freedesktop.org/poppler/poppler/commit/?id=8f4ff8243a3d599ff2a6c08b1da389e606ba4fc9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Data |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1466442 is considered high due to the stack-based buffer overflow vulnerability that leads to application crashes.
To fix REDHAT-BUG-1466442, update Poppler to the latest version that addresses this buffer overflow vulnerability.
Attackers can exploit REDHAT-BUG-1466442 by crafting malicious PDF documents that cause a denial of service when opened.
The affected software for REDHAT-BUG-1466442 is Poppler Utilities.
The impact of REDHAT-BUG-1466442 on systems includes potential crashes of applications that rely on Poppler for PDF processing.