In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106829 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:2022 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2713 | Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797 | Issue Tracking Permissions Required Third Party Advisory |
https://gitlab.freedesktop.org/poppler/poppler/issues/717 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/ | |
https://usn.ubuntu.com/3886-1/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-02-03T03:00:00
Updated: 2020-11-09T01:06:16
Reserved: 2019-02-02T00:00:00
Link: CVE-2019-7310
JSON object: View
NVD Information
Status : Modified
Published: 2019-02-03T03:29:00.277
Modified: 2023-11-07T03:13:22.457
Link: CVE-2019-7310
JSON object: View
Redhat Information
No data.