CVE-2020-35702

DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects
References
Link Resource
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 Exploit Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:freedesktop:poppler:20.12.1:*:*:*:*:*:*:*

History

07 Nov 2023, 03:22

Type Values Removed Values Added
Summary ** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects. DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects

Information

Published : 2020-12-25 02:15

Updated : 2024-08-04 17:16


NVD link : CVE-2020-35702

Mitre link : CVE-2020-35702

CVE.ORG link : CVE-2020-35702


JSON object : View

Products Affected

freedesktop

  • poppler
CWE
CWE-787

Out-of-bounds Write