The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability CVE-2019-7310

Poppler: out-of-bounds memory reading via XRef-getEntry

Synthesis of the vulnerability

An attacker can force a read at an invalid address via XRef::getEntry() of Poppler, in order to trigger a denial of service, or to obtain sensitive information.
Impacted systems: Debian, Fedora, Solaris, RHEL, Ubuntu.
Severity of this alert: 2/4.
Consequences of an intrusion: data reading, denial of service on service, denial of service on client.
Pirate's origin: document.
Creation date: 11/02/2019.
Références of this alert: bulletinapr2019, CVE-2019-7310, DLA-1706-1, FEDORA-2019-216ba46b12, FEDORA-2019-387e017332, FEDORA-2019-7085420900, FEDORA-2019-8b5e704a73, RHSA-2019:2022-01, USN-3886-1, VIGILANCE-VUL-28475.

Description of the vulnerability

An attacker can force a read at an invalid address via XRef::getEntry() of Poppler, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides applications vulnerabilities alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The technology watch team tracks security threats targeting the computer system.