漏洞信息详情
Poppler 资源管理错误漏洞
漏洞简介
Poppler是一个用于生成PDF的C++类库,该库是从Xpdf(PDF阅读器)继承而来。
Poppler 0.74.0版本中的Dict.cc文件的‘Dict::find()’函数存在存在基于栈的缓冲区错误漏洞。攻击者可借助特制的pdf文件利用该漏洞执行代码或造成拒绝服务。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://gitlab.freedesktop.org/poppler/poppler/issues/741
参考网址
来源:UBUNTU
链接:https://usn.ubuntu.com/4042-1/
来源:MISC
链接:https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
来源:gitlab.freedesktop.org
链接:https://gitlab.freedesktop.org/poppler/poppler/issues/741
来源:BID
链接:https://www.securityfocus.com/bid/107560
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2713
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
来源:BID
链接:http://www.securityfocus.com/bid/107560
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4042-1/
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107560
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2332/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3467/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9903
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154449/Red-Hat-Security-Advisory-2019-2713-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/poppler-two-vulnerabilities-29155
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153455/Ubuntu-Security-Notice-USN-4042-1.html
受影响实体
暂无
补丁
- Poppler 缓冲区错误漏洞的修复措施<!--2019-3-21-->
还没有评论,来说两句吧...