The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Poppler: integer overflow via JPXStream-init

Synthesis of the vulnerability

An attacker can trigger an integer overflow via JPXStream::init() of Poppler, in order to trigger a denial of service, and possibly to run code.
Severity of this alert: 2/4.
Creation date: 13/08/2019.
Références of this alert: bulletinoct2019, CVE-2019-9959, DLA-1963-1, DLA-1963-2, FEDORA-2019-69ec14786b, FEDORA-2019-8729e0edf5, RHSA-2019:2713-01, VIGILANCE-VUL-30023.

Description of the vulnerability

An attacker can trigger an integer overflow via JPXStream::init() of Poppler, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Request your free trial)

This computer weakness announce impacts software or systems such as Debian, Fedora, Solaris, RHEL.

Our Vigil@nce team determined that the severity of this security alert is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this vulnerability.

Solutions for this threat

Debian 8: new poppler packages.
New packages are available:
  Debian 8: poppler 0.26.5-2+deb8u12
However, xpdf does not work after.

Fedora: new poppler packages.
New packages are available:
  Fedora 29: poppler 0.67.0-22.fc29
  Fedora 30: poppler 0.73.0-14.fc30

Oracle Solaris: patch for third party software of October 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 8.0: new poppler packages.
New packages are available:
  RHEL 8: poppler 0.66.0-11.el8_0.12
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides computer security analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.