Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-2814

Опубликовано: 12 июл. 2017
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 7.5

Описание

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability.

РелизСтатусПримечание
devel

not-affected

uses system libjpeg
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [uses system libjpeg]]
esm-infra/xenial

not-affected

uses system libjpeg
precise/esm

DNE

trusty

not-affected

uses system libjpeg
trusty/esm

DNE

trusty was not-affected [uses system libjpeg]
upstream

needs-triage

vivid/ubuntu-core

DNE

xenial

not-affected

uses system libjpeg
yakkety

not-affected

uses system libjpeg

Показывать по

6.8 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability.

CVSS3: 7.5
nvd
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability.

CVSS3: 7.5
debian
больше 8 лет назад

An exploitable heap overflow vulnerability exists in the image renderi ...

CVSS3: 8.8
github
больше 3 лет назад

An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability.

6.8 Medium

CVSS2

7.5 High

CVSS3