Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12515

Опубликовано: 02 июн. 2019
Источник: debian
EPSS Низкий

Описание

There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xpdfnot-affectedpackage

Примечания

  • https://github.com/PanguL4b/pocs/tree/master/xpdf/out-of-bounds-read-in-FlateStream__getChar

EPSS

Процентиль: 53%
0.00296
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 6 лет назад

There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service.

CVSS3: 7.1
nvd
больше 6 лет назад

There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service.

CVSS3: 7.1
github
больше 3 лет назад

There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure or a denial of service.

EPSS

Процентиль: 53%
0.00296
Низкий
Уязвимость CVE-2019-12515