[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1481 --- poppler

ID: oval:org.secpod.oval:def:1700383Date: (C)2020-08-28   (M)2023-12-20
Class: PATCHFamily: unix




An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc. Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.The JPXStream::init function in Poppler 0.78.0 and earlier doesn"t check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths

Platform:
Amazon Linux 2
Product:
poppler
Reference:
ALAS2-2020-1481
CVE-2018-21009
CVE-2019-10871
CVE-2019-12293
CVE-2019-9959
CVE    4
CVE-2018-21009
CVE-2019-10871
CVE-2019-12293
CVE-2019-9959
...

© SecPod Technologies