Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8100

Опубликовано: 14 мар. 2018
Источник: debian

Описание

The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xpdfunfixedpackage

Примечания

  • https://forum.xpdfreader.com/viewtopic.php?f=3&t=654&p=819#p819

  • src:xpdf switched to use system poppler libary in 3.02-3

  • Reproducer correctly detected as broken with jessie's poppler build

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml.

CVSS3: 7.8
nvd
почти 8 лет назад

The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml.

CVSS3: 7.8
github
больше 3 лет назад

The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml.