Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1602838 | issue tracking third party advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html | third party advisory mailing list |
https://bugzilla.novell.com/show_bug.cgi?id=CVE-2018-13988 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2018:3505 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3140 | third party advisory vendor advisory |
https://cgit.freedesktop.org/poppler/poppler/commit/?id=004e3c10df0abda214f0c293f9e269fdd979c5ee | patch vendor advisory |
http://packetstormsecurity.com/files/148661/PDFunite-0.62.0-Buffer-Overflow.html | vdb entry third party advisory |
https://usn.ubuntu.com/3757-1/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |