Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fx8g-cgwg-pm6c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.

In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.

EPSS

Процентиль: 40%
0.0018
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.

CVSS3: 7.8
nvd
больше 6 лет назад

In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.

CVSS3: 7.8
debian
больше 6 лет назад

In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in ...

suse-cvrf
больше 2 лет назад

Security update for poppler

suse-cvrf
больше 2 лет назад

Security update for poppler

EPSS

Процентиль: 40%
0.0018
Низкий