Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmrm-7x9c-wj29

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Xpdf 4.01.01, there is a heap-based buffer over-read in the function DCTStream::readScan() located at Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Information Disclosure.

In Xpdf 4.01.01, there is a heap-based buffer over-read in the function DCTStream::readScan() located at Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Information Disclosure.

EPSS

Процентиль: 47%
0.00245
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In Xpdf 4.01.01, there is a heap-based buffer over-read in the function DCTStream::readScan() located at Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Information Disclosure.

CVSS3: 5.5
nvd
больше 6 лет назад

In Xpdf 4.01.01, there is a heap-based buffer over-read in the function DCTStream::readScan() located at Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Information Disclosure.

CVSS3: 5.5
debian
больше 6 лет назад

In Xpdf 4.01.01, there is a heap-based buffer over-read in the functio ...

EPSS

Процентиль: 47%
0.00245
Низкий