First published: Wed Apr 15 2009(Updated: )
An integer overflow was found in poppler's SplashBitmap::SplashBitmap method. A malicious PDF file could cause poppler to execute with permissions of the user calling the library. Will Dormann of the CERT/CC created the extensive testsuite for the JBIG2 decoder in various PDF libraries that found this flaw. Acknowledgements: Red Hat would like to thank Will Dormann of the CERT/CC for responsibly reporting this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Data |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-495907 is considered critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-495907, you should update the Poppler library to the latest patched version.
REDHAT-BUG-495907 affects systems utilizing the Poppler library for PDF processing.
Exploiting REDHAT-BUG-495907 allows an attacker to execute code with the permissions of the user running the affected application.
If you suspect your system is affected by REDHAT-BUG-495907, it is advisable to immediately update your Poppler library and assess any potential breaches.