Out-of-bounds Read Affecting poppler package, versions <0.41.0-0ubuntu1.15


Severity

Recommended
low

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1604-POPPLER-452484
  • published24 Jul 2019
  • disclosed4 Jul 2019

Introduced: 4 Jul 2019

CVE-2019-13283  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Ubuntu:16.04 poppler to version 0.41.0-0ubuntu1.15 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream poppler package and not the poppler package as distributed by Ubuntu. See How to fix? for Ubuntu:16.04 relevant fixed versions and status.

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.

CVSS Scores

version 3.1