Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-9083 (GCVE-0-2017-9083)
Vulnerability from cvelistv5
Published
2017-05-19 16:00
Modified
2024-08-05 16:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:55:22.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "name": "GLSA-201801-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201801-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-18T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "name": "GLSA-201801-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201801-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084", "refsource": "MISC", "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "name": "GLSA-201801-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201801-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-9083", "datePublished": "2017-05-19T16:00:00", "dateReserved": "2017-05-19T00:00:00", "dateUpdated": "2024-08-05T16:55:22.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-9083\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-05-19T16:29:00.197\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.\"},{\"lang\":\"es\",\"value\":\"En poppler versi\u00f3n 0.54.0, como es usado en Evince y otros productos, presenta una desreferencia de puntero NULL en la funci\u00f3n JPXStream::readUByte en el archivo JPXStream.cc. Por ejemplo, la utilidad perf_test se bloquear\u00e1 (por fallo de segmentaci\u00f3n) al analizar un archivo PDF inv\u00e1lido.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740347EF-5003-40B2-863C-D86A246DD21B\"}]}]}],\"references\":[{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=101084\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201801-17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=101084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201801-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2017-9083
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-9083", "description": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.", "id": "GSD-2017-9083", "references": [ "https://www.suse.com/security/cve/CVE-2017-9083.html", "https://ubuntu.com/security/CVE-2017-9083" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-9083" ], "details": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.", "id": "GSD-2017-9083", "modified": "2023-12-13T01:21:07.640628Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084", "refsource": "MISC", "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "name": "GLSA-201801-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201801-17" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9083" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.freedesktop.org/show_bug.cgi?id=101084", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "name": "GLSA-201801-17", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201801-17" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-03-14T19:00Z", "publishedDate": "2017-05-19T16:29Z" } } }
wid-sec-w-2023-3200
Vulnerability from csaf_certbund
Published
2017-07-10 22:00
Modified
2023-12-21 23:00
Summary
poppler: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mit poppler können PDF-Dokumente unter Unix-ähnlichen Betriebssysteme betrachtet werden.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in poppler ausnutzen, um einen Denial of Service Angriff durchzuführen oder beliebigen Programmcode ausführen zu lassen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mit poppler k\u00f6nnen PDF-Dokumente unter Unix-\u00e4hnlichen Betriebssysteme betrachtet werden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in poppler ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Programmcode ausf\u00fchren zu lassen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3200 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2023-3200.json" }, { "category": "self", "summary": "WID-SEC-2023-3200 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3200" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3350-1 vom 2017-07-10", "url": "http://www.ubuntu.com/usn/usn-3350-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1998-1 vom 2017-07-29", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171998-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1999-1 vom 2017-07-29", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171999-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:2551 vom 2017-08-31", "url": "https://access.redhat.com/errata/RHSA-2017:2551" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-2551 vom 2017-08-31", "url": "http://linux.oracle.com/errata/ELSA-2017-2551.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4079 vom 2018-01-08", "url": "https://www.debian.org/security/2018/dsa-4079" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA201801-17 vom 2018-01-17", "url": "https://security.gentoo.org/glsa/201801-17" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4941-1 vom 2023-12-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017519.html" } ], "source_lang": "en-US", "title": "poppler: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-12-21T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:04.827+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-3200", "initial_release_date": "2017-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2017-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-07-10T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2017-07-30T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2017-08-30T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-01-17T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2023-12-21T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source poppler", "product": { "name": "Open Source poppler", "product_id": "193451", "product_identification_helper": { "cpe": "cpe:/a:freedesktop:poppler:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux 14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "T003054", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04" } } }, { "category": "product_name", "name": "Ubuntu Linux 16.04 LTS", "product": { "name": "Ubuntu Linux 16.04 LTS", "product_id": "T007521", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:16.04_lts" } } }, { "category": "product_name", "name": "Ubuntu Linux 16.10", "product": { "name": "Ubuntu Linux 16.10", "product_id": "T008726", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:16.10" } } }, { "category": "product_name", "name": "Ubuntu Linux 17.04", "product": { "name": "Ubuntu Linux 17.04", "product_id": "T009999", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:17.04" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7511", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-7511" }, { "cve": "CVE-2017-7515", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-7515" }, { "cve": "CVE-2017-9083", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9083" }, { "cve": "CVE-2017-9406", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9406" }, { "cve": "CVE-2017-9408", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9408" }, { "cve": "CVE-2017-9775", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9775" }, { "cve": "CVE-2017-2820", "notes": [ { "category": "description", "text": "In poppler existiert eine Schwachstelle, welche zur Codeausf\u00fchrung ausgenutzt werden kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Code im Kontext des ausf\u00fchrenden Benutzers auszuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-2820" } ] }
WID-SEC-W-2023-3200
Vulnerability from csaf_certbund
Published
2017-07-10 22:00
Modified
2023-12-21 23:00
Summary
poppler: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mit poppler können PDF-Dokumente unter Unix-ähnlichen Betriebssysteme betrachtet werden.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in poppler ausnutzen, um einen Denial of Service Angriff durchzuführen oder beliebigen Programmcode ausführen zu lassen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mit poppler k\u00f6nnen PDF-Dokumente unter Unix-\u00e4hnlichen Betriebssysteme betrachtet werden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in poppler ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Programmcode ausf\u00fchren zu lassen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3200 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2023-3200.json" }, { "category": "self", "summary": "WID-SEC-2023-3200 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3200" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3350-1 vom 2017-07-10", "url": "http://www.ubuntu.com/usn/usn-3350-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1998-1 vom 2017-07-29", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171998-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1999-1 vom 2017-07-29", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171999-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:2551 vom 2017-08-31", "url": "https://access.redhat.com/errata/RHSA-2017:2551" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-2551 vom 2017-08-31", "url": "http://linux.oracle.com/errata/ELSA-2017-2551.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4079 vom 2018-01-08", "url": "https://www.debian.org/security/2018/dsa-4079" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA201801-17 vom 2018-01-17", "url": "https://security.gentoo.org/glsa/201801-17" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4941-1 vom 2023-12-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017519.html" } ], "source_lang": "en-US", "title": "poppler: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-12-21T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:04.827+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-3200", "initial_release_date": "2017-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2017-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-07-10T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2017-07-30T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2017-08-30T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-01-17T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2023-12-21T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source poppler", "product": { "name": "Open Source poppler", "product_id": "193451", "product_identification_helper": { "cpe": "cpe:/a:freedesktop:poppler:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux 14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "T003054", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04" } } }, { "category": "product_name", "name": "Ubuntu Linux 16.04 LTS", "product": { "name": "Ubuntu Linux 16.04 LTS", "product_id": "T007521", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:16.04_lts" } } }, { "category": "product_name", "name": "Ubuntu Linux 16.10", "product": { "name": "Ubuntu Linux 16.10", "product_id": "T008726", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:16.10" } } }, { "category": "product_name", "name": "Ubuntu Linux 17.04", "product": { "name": "Ubuntu Linux 17.04", "product_id": "T009999", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:17.04" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7511", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-7511" }, { "cve": "CVE-2017-7515", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-7515" }, { "cve": "CVE-2017-9083", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9083" }, { "cve": "CVE-2017-9406", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9406" }, { "cve": "CVE-2017-9408", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9408" }, { "cve": "CVE-2017-9775", "notes": [ { "category": "description", "text": "In poppler existieren mehrere Denial of Service Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um Speicherfehler bzw. Puffer\u00fcberl\u00e4ufe zu verursachen. In der Folge kann ein Angreifer einen Denial of Service Angriff durchf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-9775" }, { "cve": "CVE-2017-2820", "notes": [ { "category": "description", "text": "In poppler existiert eine Schwachstelle, welche zur Codeausf\u00fchrung ausgenutzt werden kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mit Hilfe eines speziell zusammengestellten PDF Dokuments ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder beliebigen Code im Kontext des ausf\u00fchrenden Benutzers auszuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T003054", "T007521", "2951", "T002207", "67646", "T008726", "T009999", "T004914", "193451" ] }, "release_date": "2017-07-10T22:00:00.000+00:00", "title": "CVE-2017-2820" } ] }
cnvd-2017-08188
Vulnerability from cnvd
Title: Evince poppler拒绝服务漏洞
Description:
Evince是GNOME桌面环境下的一个PDF、PostScript、DjVu、TIFF与DVI文档查看工具。poppler是其中的一个用于生成PDF的C++类库。
Evince和其他产品中使用的poppler 0.54.0版本的JPXStream.cc文件的‘JPXStream::readUByte’函数存在安全漏洞,该漏洞源于程序访问空指针。攻击者可利用该漏洞造成perf_test实用程序崩溃(段错误)。
Severity: 中
Formal description:
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://github.com/danigm/poppler
Reference: https://bugs.freedesktop.org/show_bug.cgi?id=101084
Impacted products
Name | Evince poppler 0.54.0 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-9083" } }, "description": "Evince\u662fGNOME\u684c\u9762\u73af\u5883\u4e0b\u7684\u4e00\u4e2aPDF\u3001PostScript\u3001DjVu\u3001TIFF\u4e0eDVI\u6587\u6863\u67e5\u770b\u5de5\u5177\u3002poppler\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u751f\u6210PDF\u7684C++\u7c7b\u5e93\u3002\r\n\r\nEvince\u548c\u5176\u4ed6\u4ea7\u54c1\u4e2d\u4f7f\u7528\u7684poppler 0.54.0\u7248\u672c\u7684JPXStream.cc\u6587\u4ef6\u7684\u2018JPXStream::readUByte\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u8bbf\u95ee\u7a7a\u6307\u9488\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210perf_test\u5b9e\u7528\u7a0b\u5e8f\u5d29\u6e83\uff08\u6bb5\u9519\u8bef\uff09\u3002", "discovererName": "Young", "formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a\r\nhttps://github.com/danigm/poppler", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-08188", "openTime": "2017-06-05", "products": { "product": "Evince poppler 0.54.0" }, "referenceLink": "https://bugs.freedesktop.org/show_bug.cgi?id=101084", "serverity": "\u4e2d", "submitTime": "2017-05-23", "title": "Evince poppler\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
suse-su-2017:1672-1
Vulnerability from csaf_suse
Published
2017-06-26 08:45
Modified
2017-06-26 08:45
Summary
Security update for poppler
Notes
Title of the patch
Security update for poppler
Description of the patch
This update for poppler fixes the following issues:
- CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid
XRef attributes (bsc#1042803).
- CVE-2017-9083: Fixed a memory leak that occurred when the parser tried
to recover from a broken input file. (bsc#1040170)
Patchnames
SUSE-SLE-DESKTOP-12-SP2-2017-1038,SUSE-SLE-RPI-12-SP2-2017-1038,SUSE-SLE-SERVER-12-SP2-2017-1038
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for poppler", "title": "Title of the patch" }, { "category": "description", "text": "This update for poppler fixes the following issues:\n\n- CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid\n XRef attributes (bsc#1042803).\n- CVE-2017-9083: Fixed a memory leak that occurred when the parser tried\n to recover from a broken input file. (bsc#1040170)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP2-2017-1038,SUSE-SLE-RPI-12-SP2-2017-1038,SUSE-SLE-SERVER-12-SP2-2017-1038", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1672-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1672-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171672-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1672-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" }, { "category": "self", "summary": "SUSE Bug 1040170", "url": "https://bugzilla.suse.com/1040170" }, { "category": "self", "summary": "SUSE Bug 1042803", "url": "https://bugzilla.suse.com/1042803" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9083 page", "url": "https://www.suse.com/security/cve/CVE-2017-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9406 page", "url": "https://www.suse.com/security/cve/CVE-2017-9406/" } ], "title": "Security update for poppler", "tracking": { "current_release_date": "2017-06-26T08:45:46Z", "generator": { "date": "2017-06-26T08:45:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1672-1", "initial_release_date": "2017-06-26T08:45:46Z", "revision_history": [ { "date": "2017-06-26T08:45:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libpoppler44-0.24.4-14.3.1.aarch64", "product": { "name": "libpoppler44-0.24.4-14.3.1.aarch64", "product_id": "libpoppler44-0.24.4-14.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libpoppler44-0.24.4-14.3.1.ppc64le", "product": { "name": "libpoppler44-0.24.4-14.3.1.ppc64le", "product_id": "libpoppler44-0.24.4-14.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libpoppler44-0.24.4-14.3.1.s390x", "product": { "name": "libpoppler44-0.24.4-14.3.1.s390x", "product_id": "libpoppler44-0.24.4-14.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpoppler44-0.24.4-14.3.1.x86_64", "product": { "name": "libpoppler44-0.24.4-14.3.1.x86_64", "product_id": "libpoppler44-0.24.4-14.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le" }, "product_reference": "libpoppler44-0.24.4-14.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x" }, "product_reference": "libpoppler44-0.24.4-14.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le" }, "product_reference": "libpoppler44-0.24.4-14.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x" }, "product_reference": "libpoppler44-0.24.4-14.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpoppler44-0.24.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" }, "product_reference": "libpoppler44-0.24.4-14.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9083" } ], "notes": [ { "category": "general", "text": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9083", "url": "https://www.suse.com/security/cve/CVE-2017-9083" }, { "category": "external", "summary": "SUSE Bug 1040170 for CVE-2017-9083", "url": "https://bugzilla.suse.com/1040170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-06-26T08:45:46Z", "details": "low" } ], "title": "CVE-2017-9083" }, { "cve": "CVE-2017-9406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9406" } ], "notes": [ { "category": "general", "text": "In Poppler 0.54.0, a memory leak vulnerability was found in the function gmalloc in gmem.cc, which allows attackers to cause a denial of service via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9406", "url": "https://www.suse.com/security/cve/CVE-2017-9406" }, { "category": "external", "summary": "SUSE Bug 1042803 for CVE-2017-9406", "url": "https://bugzilla.suse.com/1042803" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpoppler44-0.24.4-14.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-06-26T08:45:46Z", "details": "low" } ], "title": "CVE-2017-9406" } ] }
ghsa-2cff-2pfq-x5v9
Vulnerability from github
Published
2022-05-14 01:20
Modified
2022-05-14 01:20
Severity ?
VLAI Severity ?
Details
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
{ "affected": [], "aliases": [ "CVE-2017-9083" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-05-19T16:29:00Z", "severity": "MODERATE" }, "details": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.", "id": "GHSA-2cff-2pfq-x5v9", "modified": "2022-05-14T01:20:24Z", "published": "2022-05-14T01:20:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9083" }, { "type": "WEB", "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201801-17" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2017-9083
Vulnerability from fkie_nvd
Published
2017-05-19 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.freedesktop.org/show_bug.cgi?id=101084 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201801-17 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freedesktop | poppler | 0.54.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*", "matchCriteriaId": "740347EF-5003-40B2-863C-D86A246DD21B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file." }, { "lang": "es", "value": "En poppler versi\u00f3n 0.54.0, como es usado en Evince y otros productos, presenta una desreferencia de puntero NULL en la funci\u00f3n JPXStream::readUByte en el archivo JPXStream.cc. Por ejemplo, la utilidad perf_test se bloquear\u00e1 (por fallo de segmentaci\u00f3n) al analizar un archivo PDF inv\u00e1lido." } ], "id": "CVE-2017-9083", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-19T16:29:00.197", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201801-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=101084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201801-17" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…