In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.freedesktop.org/poppler/poppler/issues/717 | third party advisory exploit |
http://www.securityfocus.com/bid/106829 | vdb entry third party advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html | third party advisory mailing list |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797 | issue tracking permissions required third party advisory |
https://usn.ubuntu.com/3886-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2022 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2713 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html | third party advisory mailing list |