First published: Wed Feb 27 2019(Updated: )
A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. Reference: <a href="https://gitlab.freedesktop.org/poppler/poppler/issues/728">https://gitlab.freedesktop.org/poppler/poppler/issues/728</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Data |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1683632 is significant due to its potential to cause Denial of Service through segmentation faults.
To fix REDHAT-BUG-1683632, you should update to the latest version of Poppler where the vulnerability is patched.
REDHAT-BUG-1683632 is a heap-based buffer underwrite vulnerability.
REDHAT-BUG-1683632 affects Poppler version 0.74.0 and potentially earlier versions.
Yes, REDHAT-BUG-1683632 can be exploited remotely by sending a crafted PDF file to the pdfimages binary.