SB2018010901 - Debian update for poppler
Published: January 9, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 13 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2017-9406)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory leak in the function gmalloc in gmem.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
2) Memory leak (CVE-ID: CVE-2017-9408)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory leak in the function Object::initArray in Object.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
3) Stack-based buffer overflow (CVE-ID: CVE-2017-9775)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing PDF files within GfxState.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Integer overflow (CVE-ID: CVE-2017-9776)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow when processing PDF files within JBIG2Stream.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Buffer over-read (CVE-ID: CVE-2017-9865)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in The function GfxImageColorMap::getGray in GfxState.cc in Poppler 0.54.0. A remote attacker can perform a denial of service (stack-based buffer over-read and application crash) via a specially crafted PDF document, related to missing color-map validation in ImageOutputDev.cc.
6) NULL pointer derefenrece (CVE-ID: CVE-2017-14517)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in XRef::parseEntry() function in XRef.cc when processing PDF documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
7) Division by zero (CVE-ID: CVE-2017-14518)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a floating point exception in the isImageInterpolationRequired() function in Splash.cc via a specially crafted PDF document. A remote attacker can perform a denial of service (DoS) attack.
8) Infinite loop (CVE-ID: CVE-2017-14519)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls when processing PDF documents. A remote attacker can send a specially crafted document, trigger infinite loop and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
9) Division by zero (CVE-ID: CVE-2017-14520)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a floating point exception in Splash::scaleImageYuXd() in Splash.cc. A remote attacker can perform a denial of service (DoS) attack.
10) NULL pointer derefenrece (CVE-ID: CVE-2017-14975)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
11) Heap-based buffer overflow (CVE-ID: CVE-2017-14976)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing fonts in documents. A remote unauthenticated attacker can create a specially crafted document and trigger application crash.
12) NULL pointer derefenrece (CVE-ID: CVE-2017-14977)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in FoFiTrueType::getCFFBlock function in FoFiTrueType.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
13) NULL pointer derefenrece (CVE-ID: CVE-2017-15565)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in GfxImageColorMap::getGrayLine() function in GfxState.cc when processing PDF documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
Remediation
Install update from vendor's website.