Description
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1963-1 | poppler security update |
Debian DLA |
DLA-2440-1 | poppler security update |
Debian DLA |
DLA-3120-1 | poppler security update |
EUVD |
EUVD-2019-19313 | The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. |
Ubuntu USN |
USN-4646-1 | poppler vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:10:08.644Z
Reserved: 2019-03-23T00:00:00.000Z
Link: CVE-2019-9959
No data.
Status : Modified
Published: 2019-07-22T15:15:10.613
Modified: 2024-11-21T04:52:40.593
Link: CVE-2019-9959
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN