Debian update for poppler



Risk Low
Patch available YES
Number of vulnerabilities 13
CVE-ID CVE-2017-9406
CVE-2017-9408
CVE-2017-9775
CVE-2017-9776
CVE-2017-9865
CVE-2017-14517
CVE-2017-14518
CVE-2017-14519
CVE-2017-14520
CVE-2017-14975
CVE-2017-14976
CVE-2017-14977
CVE-2017-15565
CWE-ID CWE-401
CWE-121
CWE-190
CWE-125
CWE-476
CWE-369
CWE-835
CWE-122
Exploitation vector Network
Public exploit N/A
Vulnerable software
Debian Linux
Operating systems & Components / Operating system

Vendor Debian

Security Bulletin

This security bulletin contains information about 13 vulnerabilities.

1) Memory leak

EUVDB-ID: #VU7485

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9406

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in the function gmalloc in gmem.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU7487

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9408

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in the function Object::initArray in Object.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Stack-based buffer overflow

EUVDB-ID: #VU7270

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-9775

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing PDF files within GfxState.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Integer overflow

EUVDB-ID: #VU7272

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-9776

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when processing PDF files within JBIG2Stream.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer over-read

EUVDB-ID: #VU9876

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9865

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in The function GfxImageColorMap::getGray in GfxState.cc in Poppler 0.54.0. A remote attacker can perform a denial of service (stack-based buffer over-read and application crash) via a specially crafted PDF document, related to missing color-map validation in ImageOutputDev.cc.


Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer derefenrece

EUVDB-ID: #VU8659

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14517

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.

The vulnerability exists due to an error in  XRef::parseEntry() function in XRef.cc when processing PDF documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to cause application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Division by zero

EUVDB-ID: #VU9877

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14518

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a floating point exception in the isImageInterpolationRequired() function in Splash.cc via a specially crafted PDF document. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Infinite loop

EUVDB-ID: #VU8667

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14519

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.

The vulnerability exists due to an error in  Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls when processing PDF documents. A remote attacker can send a specially crafted document, trigger infinite loop and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to cause application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Division by zero

EUVDB-ID: #VU9878

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14520

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a floating point exception in Splash::scaleImageYuXd() in Splash.cc. A remote attacker can perform a denial of service (DoS) attack.


Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer derefenrece

EUVDB-ID: #VU8651

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14975

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.

The vulnerability exists due to an error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to cause application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Heap-based buffer overflow

EUVDB-ID: #VU8653

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14976

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing fonts in documents. A remote unauthenticated attacker can create a specially crafted document and trigger application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) NULL pointer derefenrece

EUVDB-ID: #VU8652

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-14977

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.

The vulnerability exists due to an error in FoFiTrueType::getCFFBlock function in FoFiTrueType.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to cause application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) NULL pointer derefenrece

EUVDB-ID: #VU8988

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-15565

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.

The vulnerability exists due to an error in GfxImageColorMap::getGrayLine() function in GfxState.cc when processing PDF documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to cause application crash.

Mitigation

Update the affected package to version: 0.26.5-2+deb8u2, 0.48.0-2+deb9u1.

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4079


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###