First published: Thu Jun 27 2019(Updated: )
It was discovered that poppler incorrectly handled certain files. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service, or possibly execute arbitrary code
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpoppler85 | <0.74.0-0ubuntu1.2 | 0.74.0-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/poppler-utils | <0.74.0-0ubuntu1.2 | 0.74.0-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/libpoppler79 | <0.68.0-0ubuntu1.7 | 0.68.0-0ubuntu1.7 |
=18.10 | ||
All of | ||
ubuntu/poppler-utils | <0.68.0-0ubuntu1.7 | 0.68.0-0ubuntu1.7 |
=18.10 | ||
All of | ||
ubuntu/libpoppler73 | <0.62.0-2ubuntu2.9 | 0.62.0-2ubuntu2.9 |
=18.04 | ||
All of | ||
ubuntu/poppler-utils | <0.62.0-2ubuntu2.9 | 0.62.0-2ubuntu2.9 |
=18.04 | ||
All of | ||
ubuntu/libpoppler58 | <0.41.0-0ubuntu1.14 | 0.41.0-0ubuntu1.14 |
=16.04 | ||
All of | ||
ubuntu/poppler-utils | <0.41.0-0ubuntu1.14 | 0.41.0-0ubuntu1.14 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is USN-4042-1.
The affected software in this vulnerability is libpoppler85, poppler-utils, libpoppler79, libpoppler73, libpoppler58, and poppler-utils.
Yes, if a user or automated system opens a crafted PDF file, an attacker could possibly execute arbitrary code.
This vulnerability can be exploited by tricking a user or automated system into opening a crafted PDF file.
You can find more information about this vulnerability in the following references: [link1], [link2], [link3].