Out-of-bounds Read The advisory has been revoked - it doesn't affect any version of package xpdf  (opens in a new tab)


Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-XPDF-607472
  • published19 Aug 2020
  • disclosed4 Jul 2019

Introduced: 4 Jul 2019

CVE-2019-13282  (opens in a new tab)
CWE-125  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:unstable.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xpdf package and not the xpdf package as distributed by Debian.

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in SampledFunction::transform in Function.cc when using a large index for samples. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.