Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-2818

Опубликовано: 12 июл. 2017
Источник: debian
EPSS Низкий

Описание

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
popplerunfixedpackage

Примечания

  • Debian links against libjpeg which is unaffected

  • https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319

EPSS

Процентиль: 77%
0.01018
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.

CVSS3: 7
redhat
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.

CVSS3: 7.5
nvd
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.

CVSS3: 8.8
github
больше 3 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.

EPSS

Процентиль: 77%
0.01018
Низкий