Vulnerability Details : CVE-2013-1788
poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-1788
Probability of exploitation activity in the next 30 days: 1.60%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-1788
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-1788
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1788
-
https://bugzilla.redhat.com/show_bug.cgi?id=917108
917108 – (CVE-2013-1788) CVE-2013-1788 poppler: multiple invalid memory access flaws
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:143
mandriva.com
-
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Exploit;Patch
-
http://ubuntu.com/usn/usn-1785-1
USN-1785-1: poppler vulnerabilities | Ubuntu security notices
-
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Exploit;Patch
-
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Exploit;Patch
-
http://j00ru.vexillium.org/?p=1507
PDF Fuzzing Fun Continued: Status Update | j00ru//vx tech blog
-
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Exploit;Patch
-
http://www.openwall.com/lists/oss-security/2013/02/28/8
oss-security - Re: CVE Request: poppler 0.22.1 security fixes
-
http://www.openwall.com/lists/oss-security/2013/02/28/4
oss-security - Re: CVE Request: poppler 0.22.1 security fixes
-
http://www.debian.org/security/2013/dsa-2719
Debian -- Security Information -- DSA-2719-1 poppler
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
[SECURITY] Fedora 18 Update: poppler-0.20.2-10.fc18
-
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Exploit;Patch
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
[SECURITY] Fedora 17 Update: poppler-0.18.4-4.fc17
Products affected by CVE-2013-1788
- cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*