The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/109342 | Broken Link |
https://access.redhat.com/errata/RHSA-2019:2713 | Third Party Advisory |
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-22T14:18:19
Updated: 2022-09-26T01:06:20
Reserved: 2019-03-23T00:00:00
Link: CVE-2019-9959
JSON object: View
NVD Information
Status : Modified
Published: 2019-07-22T15:15:10.613
Modified: 2023-11-07T03:13:49.653
Link: CVE-2019-9959
JSON object: View
Redhat Information
No data.
CWE