First published: Mon Feb 04 2019(Updated: )
In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo. References: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797</a> <a href="https://gitlab.freedesktop.org/poppler/poppler/issues/717">https://gitlab.freedesktop.org/poppler/poppler/issues/717</a> Upstream Patch: <a href="https://gitlab.freedesktop.org/poppler/poppler/merge_requests/172">https://gitlab.freedesktop.org/poppler/poppler/merge_requests/172</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Data |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1672419 is classified as high due to the potential for remote denial of service and application crashes.
To fix REDHAT-BUG-1672419, update to a patched version of Poppler that addresses the heap-based buffer over-read vulnerability.
The impact of REDHAT-BUG-1672419 on affected systems includes potential application crashes and denial of service due to exploitation of the vulnerability.
Users of Poppler, particularly those handling PDF documents, are affected by REDHAT-BUG-1672419.
Poppler version 0.73.0 is specifically identified as affected by REDHAT-BUG-1672419.