DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects
References
Link | Resource |
---|---|
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 | Exploit Vendor Advisory |
Configurations
History
07 Nov 2023, 03:22
Type | Values Removed | Values Added |
---|---|---|
Summary | DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects |
Information
Published : 2020-12-25 02:15
Updated : 2024-08-04 17:16
NVD link : CVE-2020-35702
Mitre link : CVE-2020-35702
CVE.ORG link : CVE-2020-35702
JSON object : View
Products Affected
freedesktop
- poppler
CWE
CWE-787
Out-of-bounds Write