SB2018042058 - Fedora EPEL 6 update for qpdf 



SB2018042058 - Fedora EPEL 6 update for qpdf

Published: April 20, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018042058
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2017-11625)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the QPDF::resolveObjectsInStream function in QPDF.cc due to infinite loop. A remote attacker can trick the victim into opening a specially crafted file, trigger stack consumption and cause the service to crash.

2) Resource exhaustion (CVE-ID: CVE-2017-11624)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc due to infinite loop after two consecutive calls to QPDFObjectHandle::parseInterna. A remote attacker can trick the victim into opening a specially crafted file, trigger stack consumption and cause the service to crash.

3) Resource exhaustion (CVE-ID: CVE-2017-12595)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in QPDFObjectHandle::parseInternal in libqpdf/QPDFObjectHandle.cc due to the tokenizer is recursive for arrays and dictionaries. A remote attacker can trick the victim into opening a specially crafted PDF document with a deep data structure, trigger stack consumption and cause the service to crash.

4) Resource exhaustion (CVE-ID: CVE-2018-9918)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the QPDFObjectHandle and QPDF_Dictionary classes due to mishandling certain "expected dictionary key but found non-name object" cases because nesting in direct objects is not restricted. A remote attacker can trigger stack exhaustion and cause the service to crash.

Remediation

Install update from vendor's website.