Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fm37-c276-3p6g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

EPSS

Процентиль: 47%
0.00239
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

CVSS3: 7.8
nvd
больше 5 лет назад

There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

CVSS3: 7.8
debian
больше 5 лет назад

There is an invalid memory access in the function TextString::~TextStr ...

EPSS

Процентиль: 47%
0.00239
Низкий