Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-18456

Опубликовано: 18 окт. 2018
Источник: debian

Описание

The function Object::isName() in Object.h (called from Gfx::opSetFillColorN) in Xpdf 4.00 allows remote attackers to cause a denial of service (stack-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xpdfunfixedpackage

Примечания

  • https://forum.xpdfreader.com/viewtopic.php?f=3&t=41217

  • https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm

  • no security impact, crash in CLI tool

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The function Object::isName() in Object.h (called from Gfx::opSetFillColorN) in Xpdf 4.00 allows remote attackers to cause a denial of service (stack-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.

CVSS3: 5.5
nvd
больше 7 лет назад

The function Object::isName() in Object.h (called from Gfx::opSetFillColorN) in Xpdf 4.00 allows remote attackers to cause a denial of service (stack-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.

CVSS3: 5.5
github
больше 3 лет назад

The function Object::isName() in Object.h (called from Gfx::opSetFillColorN) in Xpdf 4.00 allows remote attackers to cause a denial of service (stack-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.

suse-cvrf
больше 2 лет назад

Security update for poppler

suse-cvrf
больше 2 лет назад

Security update for poppler