Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-13988

Опубликовано: 25 июл. 2018
Источник: debian
EPSS Низкий

Описание

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
popplerfixed0.69.0-2package
popplerno-dsastretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1602838

  • https://cgit.freedesktop.org/poppler/poppler/commit/?id=004e3c10df0abda214f0c293f9e269fdd979c5ee (poppler-0.67.0)

EPSS

Процентиль: 74%
0.00841
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.

CVSS3: 5.3
redhat
больше 7 лет назад

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.

CVSS3: 6.5
nvd
больше 7 лет назад

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.

CVSS3: 6.5
github
больше 3 лет назад

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.

oracle-oval
около 7 лет назад

ELSA-2018-3140: GNOME security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 74%
0.00841
Низкий