Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-9083 (GCVE-0-2017-9083)
Vulnerability from cvelistv5 – Published: 2017-05-19 16:00 – Updated: 2024-08-05 16:55- n/a
| URL | Tags |
|---|---|
| https://bugs.freedesktop.org/show_bug.cgi?id=101084 | x_refsource_MISC |
| https://security.gentoo.org/glsa/201801-17 | vendor-advisoryx_refsource_GENTOO |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:55:22.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"name": "GLSA-201801-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-05-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-18T10:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"name": "GLSA-201801-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084",
"refsource": "MISC",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"name": "GLSA-201801-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201801-17"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-9083",
"datePublished": "2017-05-19T16:00:00.000Z",
"dateReserved": "2017-05-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T16:55:22.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-9083",
"date": "2026-05-18",
"epss": "0.00676",
"percentile": "0.71702"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"740347EF-5003-40B2-863C-D86A246DD21B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.\"}, {\"lang\": \"es\", \"value\": \"En poppler versi\\u00f3n 0.54.0, como es usado en Evince y otros productos, presenta una desreferencia de puntero NULL en la funci\\u00f3n JPXStream::readUByte en el archivo JPXStream.cc. Por ejemplo, la utilidad perf_test se bloquear\\u00e1 (por fallo de segmentaci\\u00f3n) al analizar un archivo PDF inv\\u00e1lido.\"}]",
"id": "CVE-2017-9083",
"lastModified": "2024-11-21T03:35:17.557",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-05-19T16:29:00.197",
"references": "[{\"url\": \"https://bugs.freedesktop.org/show_bug.cgi?id=101084\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201801-17\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.freedesktop.org/show_bug.cgi?id=101084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201801-17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-9083\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-05-19T16:29:00.197\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.\"},{\"lang\":\"es\",\"value\":\"En poppler versi\u00f3n 0.54.0, como es usado en Evince y otros productos, presenta una desreferencia de puntero NULL en la funci\u00f3n JPXStream::readUByte en el archivo JPXStream.cc. Por ejemplo, la utilidad perf_test se bloquear\u00e1 (por fallo de segmentaci\u00f3n) al analizar un archivo PDF inv\u00e1lido.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740347EF-5003-40B2-863C-D86A246DD21B\"}]}]}],\"references\":[{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=101084\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201801-17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=101084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201801-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GSD-2017-9083
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-9083",
"description": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.",
"id": "GSD-2017-9083",
"references": [
"https://www.suse.com/security/cve/CVE-2017-9083.html",
"https://ubuntu.com/security/CVE-2017-9083"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-9083"
],
"details": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.",
"id": "GSD-2017-9083",
"modified": "2023-12-13T01:21:07.640628Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084",
"refsource": "MISC",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"name": "GLSA-201801-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201801-17"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9083"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"name": "GLSA-201801-17",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201801-17"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-03-14T19:00Z",
"publishedDate": "2017-05-19T16:29Z"
}
}
}
WID-SEC-W-2023-3200
Vulnerability from csaf_certbund - Published: 2017-07-10 22:00 - Updated: 2023-12-21 23:00In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Pufferüberläufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
In poppler existiert eine Schwachstelle, welche zur Codeausführung ausgenutzt werden kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um einen Denial of Service Angriff durchzuführen oder beliebigen Code im Kontext des ausführenden Benutzers auszuführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu öffnen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Ubuntu Linux 14.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:14.04
|
— | |
|
Ubuntu Linux 16.04 LTS
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.04_lts
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux 16.10
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:16.10
|
— | |
|
Ubuntu Linux 17.04
Ubuntu / Linux
|
cpe:/o:canonical:ubuntu_linux:17.04
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source poppler
Open Source
|
cpe:/a:freedesktop:poppler:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mit poppler k\u00f6nnen PDF-Dokumente unter Unix-\u00e4hnlichen Betriebssysteme betrachtet werden.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in poppler ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Programmcode ausf\u00fchren zu lassen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-3200 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2023-3200.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-3200 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3200"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3350-1 vom 2017-07-10",
"url": "http://www.ubuntu.com/usn/usn-3350-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:1998-1 vom 2017-07-29",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171998-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:1999-1 vom 2017-07-29",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171999-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:2551 vom 2017-08-31",
"url": "https://access.redhat.com/errata/RHSA-2017:2551"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2017-2551 vom 2017-08-31",
"url": "http://linux.oracle.com/errata/ELSA-2017-2551.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4079 vom 2018-01-08",
"url": "https://www.debian.org/security/2018/dsa-4079"
},
{
"category": "external",
"summary": "GENTOO Security Advisory GLSA201801-17 vom 2018-01-17",
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4941-1 vom 2023-12-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017519.html"
}
],
"source_lang": "en-US",
"title": "poppler: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-12-21T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:03:04.827+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-3200",
"initial_release_date": "2017-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2017-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2017-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-07-30T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2017-08-30T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-01-07T23:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2018-01-17T23:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2023-12-21T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source poppler",
"product": {
"name": "Open Source poppler",
"product_id": "193451",
"product_identification_helper": {
"cpe": "cpe:/a:freedesktop:poppler:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux 14.04 LTS",
"product": {
"name": "Ubuntu Linux 14.04 LTS",
"product_id": "T003054",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:14.04"
}
}
},
{
"category": "product_name",
"name": "Ubuntu Linux 16.04 LTS",
"product": {
"name": "Ubuntu Linux 16.04 LTS",
"product_id": "T007521",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:16.04_lts"
}
}
},
{
"category": "product_name",
"name": "Ubuntu Linux 16.10",
"product": {
"name": "Ubuntu Linux 16.10",
"product_id": "T008726",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:16.10"
}
}
},
{
"category": "product_name",
"name": "Ubuntu Linux 17.04",
"product": {
"name": "Ubuntu Linux 17.04",
"product_id": "T009999",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:17.04"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7511",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-7511"
},
{
"cve": "CVE-2017-7515",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-7515"
},
{
"cve": "CVE-2017-9083",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-9083"
},
{
"cve": "CVE-2017-9406",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-9406"
},
{
"cve": "CVE-2017-9408",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-9408"
},
{
"cve": "CVE-2017-9775",
"notes": [
{
"category": "description",
"text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-9775"
},
{
"cve": "CVE-2017-2820",
"notes": [
{
"category": "description",
"text": "In poppler existiert eine Schwachstelle, welche zur Codeausf\u00fchrung ausgenutzt werden kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Code im Kontext des ausf\u00fchrenden Benutzers auszuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T003054",
"T007521",
"2951",
"T002207",
"67646",
"T008726",
"T009999",
"T004914",
"193451"
]
},
"release_date": "2017-07-10T22:00:00.000+00:00",
"title": "CVE-2017-2820"
}
]
}
FKIE_CVE-2017-9083
Vulnerability from fkie_nvd - Published: 2017-05-19 16:29 - Updated: 2026-05-13 00:24| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| freedesktop | poppler | 0.54.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*",
"matchCriteriaId": "740347EF-5003-40B2-863C-D86A246DD21B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file."
},
{
"lang": "es",
"value": "En poppler versi\u00f3n 0.54.0, como es usado en Evince y otros productos, presenta una desreferencia de puntero NULL en la funci\u00f3n JPXStream::readUByte en el archivo JPXStream.cc. Por ejemplo, la utilidad perf_test se bloquear\u00e1 (por fallo de segmentaci\u00f3n) al analizar un archivo PDF inv\u00e1lido."
}
],
"id": "CVE-2017-9083",
"lastModified": "2026-05-13T00:24:29.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-19T16:29:00.197",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
SUSE-SU-2017:1672-1
Vulnerability from csaf_suse - Published: 2017-06-26 08:45 - Updated: 2017-06-26 08:45| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for poppler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for poppler fixes the following issues:\n\n- CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid\n XRef attributes (bsc#1042803).\n- CVE-2017-9083: Fixed a memory leak that occurred when the parser tried\n to recover from a broken input file. (bsc#1040170)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP2-2017-1038,SUSE-SLE-RPI-12-SP2-2017-1038,SUSE-SLE-SERVER-12-SP2-2017-1038",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1672-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1672-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171672-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1672-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html"
},
{
"category": "self",
"summary": "SUSE Bug 1040170",
"url": "https://bugzilla.suse.com/1040170"
},
{
"category": "self",
"summary": "SUSE Bug 1042803",
"url": "https://bugzilla.suse.com/1042803"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9083 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9406 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9406/"
}
],
"title": "Security update for poppler",
"tracking": {
"current_release_date": "2017-06-26T08:45:46Z",
"generator": {
"date": "2017-06-26T08:45:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1672-1",
"initial_release_date": "2017-06-26T08:45:46Z",
"revision_history": [
{
"date": "2017-06-26T08:45:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpoppler44-0.24.4-14.3.1.aarch64",
"product": {
"name": "libpoppler44-0.24.4-14.3.1.aarch64",
"product_id": "libpoppler44-0.24.4-14.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler44-0.24.4-14.3.1.ppc64le",
"product": {
"name": "libpoppler44-0.24.4-14.3.1.ppc64le",
"product_id": "libpoppler44-0.24.4-14.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler44-0.24.4-14.3.1.s390x",
"product": {
"name": "libpoppler44-0.24.4-14.3.1.s390x",
"product_id": "libpoppler44-0.24.4-14.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpoppler44-0.24.4-14.3.1.x86_64",
"product": {
"name": "libpoppler44-0.24.4-14.3.1.x86_64",
"product_id": "libpoppler44-0.24.4-14.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
},
"product_reference": "libpoppler44-0.24.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-9083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9083"
}
],
"notes": [
{
"category": "general",
"text": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9083",
"url": "https://www.suse.com/security/cve/CVE-2017-9083"
},
{
"category": "external",
"summary": "SUSE Bug 1040170 for CVE-2017-9083",
"url": "https://bugzilla.suse.com/1040170"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-26T08:45:46Z",
"details": "low"
}
],
"title": "CVE-2017-9083"
},
{
"cve": "CVE-2017-9406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9406"
}
],
"notes": [
{
"category": "general",
"text": "In Poppler 0.54.0, a memory leak vulnerability was found in the function gmalloc in gmem.cc, which allows attackers to cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9406",
"url": "https://www.suse.com/security/cve/CVE-2017-9406"
},
{
"category": "external",
"summary": "SUSE Bug 1042803 for CVE-2017-9406",
"url": "https://bugzilla.suse.com/1042803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-26T08:45:46Z",
"details": "low"
}
],
"title": "CVE-2017-9406"
}
]
}
CNVD-2017-08188
Vulnerability from cnvd - Published: 2017-06-05目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://github.com/danigm/poppler
| Name | Evince poppler 0.54.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-9083"
}
},
"description": "Evince\u662fGNOME\u684c\u9762\u73af\u5883\u4e0b\u7684\u4e00\u4e2aPDF\u3001PostScript\u3001DjVu\u3001TIFF\u4e0eDVI\u6587\u6863\u67e5\u770b\u5de5\u5177\u3002poppler\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u751f\u6210PDF\u7684C++\u7c7b\u5e93\u3002\r\n\r\nEvince\u548c\u5176\u4ed6\u4ea7\u54c1\u4e2d\u4f7f\u7528\u7684poppler 0.54.0\u7248\u672c\u7684JPXStream.cc\u6587\u4ef6\u7684\u2018JPXStream::readUByte\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u8bbf\u95ee\u7a7a\u6307\u9488\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210perf_test\u5b9e\u7528\u7a0b\u5e8f\u5d29\u6e83\uff08\u6bb5\u9519\u8bef\uff09\u3002",
"discovererName": "Young",
"formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a\r\nhttps://github.com/danigm/poppler",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-08188",
"openTime": "2017-06-05",
"products": {
"product": "Evince poppler 0.54.0"
},
"referenceLink": "https://bugs.freedesktop.org/show_bug.cgi?id=101084",
"serverity": "\u4e2d",
"submitTime": "2017-05-23",
"title": "Evince poppler\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
GHSA-2CFF-2PFQ-X5V9
Vulnerability from github – Published: 2022-05-14 01:20 – Updated: 2022-05-14 01:20poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
{
"affected": [],
"aliases": [
"CVE-2017-9083"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-05-19T16:29:00Z",
"severity": "MODERATE"
},
"details": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.",
"id": "GHSA-2cff-2pfq-x5v9",
"modified": "2022-05-14T01:20:24Z",
"published": "2022-05-14T01:20:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9083"
},
{
"type": "WEB",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201801-17"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.