The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

weakness CVE-2019-14494

Poppler: denial of service via SplashOutputDev-tilingPatternFill

Synthesis of the vulnerability

An attacker can trigger a fatal error via SplashOutputDev::tilingPatternFill() of Poppler, in order to trigger a denial of service.
Severity of this bulletin: 2/4.
Creation date: 13/08/2019.
Références of this threat: bulletinoct2019, CVE-2019-14494, USN-4091-1, VIGILANCE-VUL-30027.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can trigger a fatal error via SplashOutputDev::tilingPatternFill() of Poppler, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This vulnerability announce impacts software or systems such as Solaris, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat

Oracle Solaris: patch for third party software of October 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Ubuntu: new poppler packages.
New packages are available:
  Ubuntu 19.04: poppler 0.74.0-0ubuntu1.3
  Ubuntu 18.04 LTS: poppler 0.62.0-2ubuntu2.10
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides computers vulnerabilities patches. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.