Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2019.0244
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2019-0244)
Resumen:The remote host is missing an update for the 'poppler' package(s) announced via the MGASA-2019-0244 advisory.
Descripción:Summary:
The remote host is missing an update for the 'poppler' package(s) announced via the MGASA-2019-0244 advisory.

Vulnerability Insight:
Updated poppler packages fix security vulnerabilities

Poppler 0.74.0 has a heap-based buffer over-read in the CairoRescaleBox.cc
downsample_row_box_filter function. (CVE-2019-9631)

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking,
leading to stack consumption in the function Dict::find() located at
Dict.cc, which can (for example) be triggered by passing a crafted pdf
file to the pdfunite binary. (CVE-2019-9903)

An issue was discovered in Xpdf 4.01.01. There is an FPE in the function
PostScriptFunction::exec at Function.cc for the psOpIdiv case.
(CVE-2019-10018)

An issue was discovered in Xpdf 4.01.01. There is an FPE in the function
ImageStream::ImageStream at Stream.cc for nComps. (CVE-2019-10021)

An issue was discovered in Xpdf 4.01.01. There is an FPE in the function
PostScriptFunction::exec at Function.cc for the psOpMod case.
(CVE-2019-10023)

An issue was discovered in Poppler 0.74.0. There is a heap-based buffer
over-read in the function Splash::blitTransparent at splash/Splash.cc.
(CVE-2019-10872)

In Poppler through 0.76.1, there is a heap-based buffer over-read in
JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights
or widths. (CVE-2019-12293)

An issue was discovered in Poppler through 0.78.0. There is a
divide-by-zero error in the function SplashOutputDev::tilingPatternFill
at SplashOutputDev.cc. (CVE-2019-14494)

Affected Software/OS:
'poppler' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-10018
https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://usn.ubuntu.com/4042-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-10021
https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274
Common Vulnerability Exposure (CVE) ID: CVE-2019-10023
Common Vulnerability Exposure (CVE) ID: CVE-2019-10872
BugTraq ID: 107862
http://www.securityfocus.com/bid/107862
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://gitlab.freedesktop.org/poppler/poppler/issues/750
https://lists.debian.org/debian-lts-announce/2019/06/msg00002.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-12293
BugTraq ID: 108457
http://www.securityfocus.com/bid/108457
https://gitlab.freedesktop.org/poppler/poppler/issues/768
RedHat Security Advisories: RHSA-2019:2713
https://access.redhat.com/errata/RHSA-2019:2713
Common Vulnerability Exposure (CVE) ID: CVE-2019-14494
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html
https://usn.ubuntu.com/4091-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-9631
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/
https://gitlab.freedesktop.org/poppler/poppler/issues/736
https://lists.debian.org/debian-lts-announce/2019/04/msg00011.html
RedHat Security Advisories: RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2022
Common Vulnerability Exposure (CVE) ID: CVE-2019-9903
BugTraq ID: 107560
http://www.securityfocus.com/bid/107560
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.