English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891562
Category:Debian Local Security Checks
Title:Debian LTS Advisory ([SECURITY] [DLA 1562-1] poppler security update)
Summary:Various security issues were discovered in the poppler PDF rendering;shared library.;;CVE-2017-18267;;The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler;through 0.64.0 allows remote attackers to cause a denial of service;(infinite recursion) via a crafted PDF file, as demonstrated by;pdftops.;;The applied fix in FoFiType1C::cvtGlyph prevents infinite recursion;on such malformed documents.;;CVE-2018-10768;;A NULL pointer dereference in the AnnotPath::getCoordsLength function;in Annot.h in Poppler 0.24.5 had been discovered. A crafted input;will lead to a remote denial of service attack. Later versions of;Poppler such as 0.41.0 are not affected.;;The applied patch fixes the crash on AnnotInk::draw for malformed;documents.;;CVE-2018-13988;;Poppler through 0.62 contains an out of bounds read vulnerability due;to an incorrect memory access that is not mapped in its memory space,;as demonstrated by pdfunite. This can result in memory corruption and;denial of service. This may be exploitable when a victim opens a;specially crafted PDF file.;;The applied patch fixes crashes when Object has negative number.;(Specs say, number has to be > 0 and gen >= 0).;;For Poppler in Debian jessie, the original upstream patch has been;backported to Poppler's old Object API.;;CVE-2018-16646;;In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may;cause infinite recursion via a crafted file. A remote attacker can;leverage this for a DoS attack.;;A range of upstream patches has been applied to Poppler's XRef.cc in;Debian jessie to consolidate a fix for this issue.
Description:Summary:
Various security issues were discovered in the poppler PDF rendering
shared library.

CVE-2017-18267

The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler
through 0.64.0 allows remote attackers to cause a denial of service
(infinite recursion) via a crafted PDF file, as demonstrated by
pdftops.

The applied fix in FoFiType1C::cvtGlyph prevents infinite recursion
on such malformed documents.

CVE-2018-10768

A NULL pointer dereference in the AnnotPath::getCoordsLength function
in Annot.h in Poppler 0.24.5 had been discovered. A crafted input
will lead to a remote denial of service attack. Later versions of
Poppler such as 0.41.0 are not affected.

The applied patch fixes the crash on AnnotInk::draw for malformed
documents.

CVE-2018-13988

Poppler through 0.62 contains an out of bounds read vulnerability due
to an incorrect memory access that is not mapped in its memory space,
as demonstrated by pdfunite. This can result in memory corruption and
denial of service. This may be exploitable when a victim opens a
specially crafted PDF file.

The applied patch fixes crashes when Object has negative number.
(Specs say, number has to be > 0 and gen >= 0).

For Poppler in Debian jessie, the original upstream patch has been
backported to Poppler's old Object API.

CVE-2018-16646

In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may
cause infinite recursion via a crafted file. A remote attacker can
leverage this for a DoS attack.

A range of upstream patches has been applied to Poppler's XRef.cc in
Debian jessie to consolidate a fix for this issue.

Affected Software/OS:
poppler on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
0.26.5-2+deb8u5.

We recommend that you upgrade your poppler packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-18267
Common Vulnerability Exposure (CVE) ID: CVE-2018-10768
Common Vulnerability Exposure (CVE) ID: CVE-2018-13988
Common Vulnerability Exposure (CVE) ID: CVE-2018-16646
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 72306 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.