First published: Fri Mar 22 2019(Updated: )
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. Reference: <a href="https://gitlab.freedesktop.org/poppler/poppler/issues/741">https://gitlab.freedesktop.org/poppler/poppler/issues/741</a> Upstream commit: <a href="https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd">https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Utilities | =0.74.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1691724 is classified as critical due to potential stack consumption leading to denial of service.
To fix REDHAT-BUG-1691724, upgrade Poppler to version 0.74.1 or later where the vulnerability is addressed.
Poppler version 0.74.0 is affected by REDHAT-BUG-1691724.
REDHAT-BUG-1691724 can be exploited by processing a crafted PDF file using the pdfunite binary.
The vulnerability REDHAT-BUG-1691724 involves the PDFDoc::markObject function and Dict::find() method in Poppler.