First published: Wed May 16 2018(Updated: )
The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file, as demonstrated by pdftops. Upstream bug: <a href="https://bugzilla.freedesktop.org/show_bug.cgi?id=103238">https://bugzilla.freedesktop.org/show_bug.cgi?id=103238</a> Upstream patch: <a href="https://cgit.freedesktop.org/poppler/poppler/commit/?id=60b4fe65bc9dc9b82bbadf0be2e3781be796a13d">https://cgit.freedesktop.org/poppler/poppler/commit/?id=60b4fe65bc9dc9b82bbadf0be2e3781be796a13d</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Data | <0.64.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1578777 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1578777, you should upgrade Poppler to version 0.64.0 or later.
REDHAT-BUG-1578777 affects Freedesktop Poppler versions up to but not including 0.64.0.
REDHAT-BUG-1578777 enables remote attackers to cause a denial of service through crafted PDF files.
There is no known workaround for REDHAT-BUG-1578777 other than upgrading the affected software.