Description
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within PdfEncoding::ParseToUnicode. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5673.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-6242 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within PdfEncoding::ParseToUnicode. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5673. |
References
| Link | Providers |
|---|---|
| https://zerodayinitiative.com/advisories/ZDI-18-1046 |
|
History
No history.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-05T09:21:41.646Z
Reserved: 2018-07-16T00:00:00.000Z
Link: CVE-2018-14320
No data.
Status : Modified
Published: 2018-09-17T18:29:00.390
Modified: 2024-11-21T03:48:48.907
Link: CVE-2018-14320
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD