Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7296

Опубликовано: 26 янв. 2014
Источник: debian
EPSS Низкий

Описание

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
popplernot-affectedpackage

Примечания

  • http://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee

  • https://bugs.kde.org/show_bug.cgi?id=328511

EPSS

Процентиль: 85%
0.02482
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

redhat
почти 12 лет назад

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

nvd
почти 12 лет назад

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

github
больше 3 лет назад

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

EPSS

Процентиль: 85%
0.02482
Низкий
Уязвимость CVE-2013-7296