First published: Thu Jan 10 2019(Updated: )
A flaw was found in Poppler 0.72.0. A NULL pointer dereference in the XRef::getEntry class in XRef.cc file due to the mishandle of unallocated XRef entries. This allows remote attackers to cause a denial of service via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser::makeStream in Parser.cc. References: <a href="https://gitlab.freedesktop.org/poppler/poppler/issues/692">https://gitlab.freedesktop.org/poppler/poppler/issues/692</a> Upstream Patch: <a href="https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143">https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Utilities | =0.72.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1665266 is considered to be high due to the potential denial of service caused by malformed PDF documents.
To fix REDHAT-BUG-1665266, upgrade Poppler to a patched version that resolves the NULL pointer dereference issue.
The affected software for REDHAT-BUG-1665266 is Poppler version 0.72.0.
Yes, REDHAT-BUG-1665266 can be exploited remotely through crafted PDF documents.
The impact of REDHAT-BUG-1665266 is a denial of service, leading to potential application crashes when processing malicious PDF files.