Vulnerability Name: | CVE-2019-9587 (CCN-158219) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2019-03-01 | ||||||||||||||||||||||||||||||||||||
Published: | 2019-03-01 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-06 | ||||||||||||||||||||||||||||||||||||
Summary: | There is a stack consumption issue in md5Round1() located in Decrypt.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to Catalog::countPageTree. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-9587 Source: XF Type: UNKNOWN xpdf-cve20199587-dos(158219) Source: MISC Type: Exploit, Third Party Advisory https://forum.xpdfreader.com/viewtopic.php?f=3&t=41263 Source: MISC Type: Exploit, Third Party Advisory https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/ Source: CCN Type: Loginsoft Web site CVE-2019-9587: Stack consumption issue in function md5Round1( ) xpdf-4.01 Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-9587 Source: CCN Type: Xpdf Web site Xpdf | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |