A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach.
References
| Link | Resource |
|---|---|
| https://gitlab.freedesktop.org/poppler/poppler/issues/704 | Issue Tracking Patch Third Party Advisory |
| https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7 | Patch Third Party Advisory |
| http://www.securityfocus.com/bid/106459 | Third Party Advisory VDB Entry |
| https://usn.ubuntu.com/3865-1/ | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2019:2022 | |
| https://access.redhat.com/errata/RHSA-2019:2713 | |
| https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html | |
| https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-01-01 16:29
Updated : 2020-11-09 02:15
NVD link : CVE-2018-20650
Mitre link : CVE-2018-20650
JSON object : View
Products Affected
canonical
- ubuntu_linux
freedesktop
- poppler
CWE
CWE-20
Improper Input Validation
