CVE-2019-13283Out-of-bounds Read in Fedora

CWE-125Out-of-bounds Read9 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.3%
top 47.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 4
Latest updateMay 24

Description

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Ubuntufreedesktop/poppler< 0.41.0-0ubuntu1.15

Also affects: Fedora 29, 30, 31

🔴Vulnerability Details

3
GHSA
GHSA-29m3-xwpr-p76m: In Xpdf 42022-05-24
CVEList
CVE-2019-13283: In Xpdf 42019-07-04
OSV
CVE-2019-13283: In Xpdf 42019-07-04

📋Vendor Advisories

2
Ubuntu
poppler vulnerabilities2020-11-25
Debian
CVE-2019-13283: xpdf - In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy fro...2019

💬Community

3
Bugzilla
CVE-2019-13283 xpdf: heap-based buffer over-read in FoFiType1::parse in fofi/FoFiType1.cc2019-07-08
Bugzilla
CVE-2019-13283 xpdf: heap-based buffer over-read in FoFiType1::parse in fofi/FoFiType1.cc [epel-all]2019-07-08
Bugzilla
CVE-2019-13283 xpdf: heap-based buffer over-read in FoFiType1::parse in fofi/FoFiType1.cc [fedora-all]2019-07-08
CVE-2019-13283 — Out-of-bounds Read in Fedora | cvebase