Out-of-Bounds Affecting libpodofo package, versions *


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.6% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-LIBPODOFO-319132
  • published25 Sept 2018
  • disclosed17 Sept 2018

Introduced: 17 Sep 2018

CVE-2018-14320  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for Debian:8 libpodofo.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpodofo package and not the libpodofo package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within PdfEncoding::ParseToUnicode. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5673.