Ubuntu update for poppler



| Updated: 2017-07-12
Risk High
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2017-2820
CVE-2017-7511
CVE-2017-7515
CVE-2017-9083
CVE-2017-9406
CVE-2017-9408
CVE-2017-9775
CWE-ID CWE-190
CWE-476
CWE-674
CWE-401
CWE-121
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU7414

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-2820

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exist due to integer overflow in the JPEG 2000 image parsing functionality when handling malicious data. A remote attacker can send a specially crafted PDF file, trick the victim into opening it, trigger out of bounds memory overwrite on the heap and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3 External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Null pointer dereference

EUVDB-ID: #VU7488

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-7511

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to NULL pointer dereference in the pdfunite when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Uncontrolled recursion

EUVDB-ID: #VU7489

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-7515

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to uncontrolled recursion in pdfunite when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Null pointer dereference

EUVDB-ID: #VU7486

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9083

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it, trigger segmentation fault and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU7485

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9406

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in the function gmalloc in gmem.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Memory leak

EUVDB-ID: #VU7487

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9408

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in the function Object::initArray in Object.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Stack-based buffer overflow

EUVDB-ID: #VU7270

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-9775

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing PDF files within GfxState.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.

Ubuntu 17.04:
libpoppler64 0.48.0-2ubuntu2.1
libpoppler-qt4-4 0.48.0-2ubuntu2.1
libpoppler-cpp0v5 0.48.0-2ubuntu2.1
libpoppler-glib8 0.48.0-2ubuntu2.1
libpoppler-qt5-1 0.48.0-2ubuntu2.1
poppler-utils 0.48.0-2ubuntu2.1
Ubuntu 16.10:
libpoppler61 0.44.0-3ubuntu2.1
poppler-utils 0.44.0-3ubuntu2.1
libpoppler-qt4-4 0.44.0-3ubuntu2.1
libpoppler-cpp0v5 0.44.0-3ubuntu2.1
libpoppler-glib8 0.44.0-3ubuntu2.1
libpoppler-qt5-1 0.44.0-3ubuntu2.1
Ubuntu 16.04 LTS:
libpoppler58 0.41.0-0ubuntu1.2
poppler-utils 0.41.0-0ubuntu1.2
libpoppler-cpp0 0.41.0-0ubuntu1.2
libpoppler-glib8 0.41.0-0ubuntu1.2
libpoppler-qt4-4 0.41.0-0ubuntu1.2
libpoppler-qt5-1 0.41.0-0ubuntu1.2
Ubuntu 14.04 LTS:
poppler-utils 0.24.5-2ubuntu4.5
libpoppler-qt4-4 0.24.5-2ubuntu4.5
libpoppler44 0.24.5-2ubuntu4.5
libpoppler-glib8 0.24.5-2ubuntu4.5
libpoppler-cpp0 0.24.5-2ubuntu4.5
libpoppler-qt5-1 0.24.5-2ubuntu4.5

Vulnerable software versions

Ubuntu: 14.04 - 17.04

CPE2.3
External links

https://www.ubuntu.com/usn/usn-3350-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###