Out-of-bounds Read Affecting libpoppler-glib8 package, versions <0.62.0-150000.4.9.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES151-LIBPOPPLERGLIB8-3330265
  • published23 Feb 2023
  • disclosed22 Feb 2023

Introduced: 22 Feb 2023

CVE-2019-13283  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade SLES:15.1 libpoppler-glib8 to version 0.62.0-150000.4.9.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpoppler-glib8 package and not the libpoppler-glib8 package as distributed by SLES. See How to fix? for SLES:15.1 relevant fixed versions and status.

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.

CVSS Scores

version 3.1