SB2018040801 - Gentoo update for Poppler
Published: April 8, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-1000456)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to improper validation of boundaries in TextPool::addWord in freedesktop.org libpoppler. A remote attacker can trigger overflow in subsequent calculations and cause the service to crash.
2) NULL pointer derefenrece (CVE-ID: CVE-2017-14975)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
3) Heap-based buffer overflow (CVE-ID: CVE-2017-14976)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error in FoFiType1C::convertToType0 function in FoFiType1C.cc when processing fonts in documents. A remote unauthenticated attacker can create a specially crafted document and trigger application crash.
4) NULL pointer derefenrece (CVE-ID: CVE-2017-14977)
The vulnerability allows a remote attacker to cause a denial of service (DoS) conditions.
The vulnerability exists due to an error in FoFiTrueType::getCFFBlock function in FoFiTrueType.cc when processing documents. A remote attacker can send a specially crafted document, trigger NULL pointer dereference and perform a denial of service attack.
Successful exploitation of the vulnerability may allow an attacker to cause application crash.
Remediation
Install update from vendor's website.