vulnerability
Red Hat: CVE-2019-9959: CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | 2019-07-22 | 2019-09-12 | 2024-11-27 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
2019-07-22
Added
2019-09-12
Modified
2024-11-27
Description
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
Solution(s)
redhat-upgrade-evinceredhat-upgrade-evince-browser-pluginredhat-upgrade-evince-debuginforedhat-upgrade-evince-develredhat-upgrade-evince-dviredhat-upgrade-evince-libsredhat-upgrade-evince-nautilusredhat-upgrade-popplerredhat-upgrade-poppler-cppredhat-upgrade-poppler-cpp-debuginforedhat-upgrade-poppler-cpp-develredhat-upgrade-poppler-debuginforedhat-upgrade-poppler-debugsourceredhat-upgrade-poppler-demosredhat-upgrade-poppler-develredhat-upgrade-poppler-glibredhat-upgrade-poppler-glib-debuginforedhat-upgrade-poppler-glib-develredhat-upgrade-poppler-qtredhat-upgrade-poppler-qt-develredhat-upgrade-poppler-qt5redhat-upgrade-poppler-qt5-debuginforedhat-upgrade-poppler-qt5-develredhat-upgrade-poppler-utilsredhat-upgrade-poppler-utils-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.