ALAS2-2020-1481 --- popplerID: oval:org.secpod.oval:def:1700383 | Date: (C)2020-08-28 (M)2023-12-20 |
Class: PATCH | Family: unix |
An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc. Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.The JPXStream::init function in Poppler 0.78.0 and earlier doesn"t check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths