Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9903

Опубликовано: 15 мар. 2019
Источник: redhat
CVSS3: 3.3

Описание

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5popplerNot affected
Red Hat Enterprise Linux 6popplerNot affected
Red Hat Enterprise Linux 7popplerNot affected
Red Hat Enterprise Linux 8popplerFixedRHSA-2019:271312.09.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1691724poppler: stack consumption in function Dict::find() in Dict.cc

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVSS3: 6.5
nvd
около 6 лет назад

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVSS3: 6.5
debian
около 6 лет назад

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict mark ...

CVSS3: 6.5
github
около 3 лет назад

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVSS3: 6.5
fstec
больше 6 лет назад

Уязвимость функции Dict::find() компонента Dict.cc библиотеки для отображения PDF-файлов Poppler, позволяющая нарушителю вызвать отказ в обслуживании

3.3 Low

CVSS3