Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2020-23804 CVE-2022-37050 CVE-2022-37051 CVE-2022-37052 CVE-2022-38349 CVE-2018-20662 |
CWE-ID | CWE-674 CWE-20 CWE-617 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #6 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system poppler-help Operating systems & Components / Operating system package or component poppler-glib-doc Operating systems & Components / Operating system package or component poppler-qt5-devel Operating systems & Components / Operating system package or component poppler-glib-devel Operating systems & Components / Operating system package or component poppler-glib Operating systems & Components / Operating system package or component poppler-debuginfo Operating systems & Components / Operating system package or component poppler-cpp Operating systems & Components / Operating system package or component poppler-debugsource Operating systems & Components / Operating system package or component poppler-devel Operating systems & Components / Operating system package or component poppler-utils Operating systems & Components / Operating system package or component poppler-cpp-devel Operating systems & Components / Operating system package or component poppler-qt5 Operating systems & Components / Operating system package or component poppler Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU81718
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-23804
CWE-ID:
CWE-674 - Uncontrolled Recursion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion in pdfinfo and pdftops. A remote attacker can pass a specially crafted document to application and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82598
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37050
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the PDFDoc::savePageAs() function in PDFDoc.c. A remote attacker can trick the victim to open a specially crafted PDF file and perform a denial of service (DoS) attack.
Note, the vulnerability exists due to incomplete patch for #VU16830 (CVE-2018-20662).
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82599
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37051
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion in pdfunite.cc. A remote attacker can trick the victim to open a specially crafted PDF file and crash the application.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82597
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37052
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion in Object::getString(). A remote attacker can trick the victim to open a specially crafted file and crash the application.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82600
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-38349
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion within the PDFDoc::replacePageDict() function in PDFDoc.cc. A remote attacker can trick the victim to open a specially crafted PDF file and crash the application.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16830
Risk: Low
CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2018-20662
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a wrong return value from PDFDoc::setup when an xref data structure is mishandled during extractPDFSubtype processing. A remote attacker can trick the victim into opening a specially crafter PDF file cause application crash by Object.h SIGABRT.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS
poppler-help: before 0.90.0-6
poppler-glib-doc: before 0.90.0-6
poppler-qt5-devel: before 0.90.0-6
poppler-glib-devel: before 0.90.0-6
poppler-glib: before 0.90.0-6
poppler-debuginfo: before 0.90.0-6
poppler-cpp: before 0.90.0-6
poppler-debugsource: before 0.90.0-6
poppler-devel: before 0.90.0-6
poppler-utils: before 0.90.0-6
poppler-cpp-devel: before 0.90.0-6
poppler-qt5: before 0.90.0-6
poppler: before 0.90.0-6
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1613
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.