CVE-2013-4474
Published: 23 November 2013
Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
Priority
Status
Package | Release | Status |
---|---|---|
poppler Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(code not present)
|
precise |
Released
(0.18.4-1ubuntu3.2)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [0.24.3-0ubuntu1])
|
|
upstream |
Released
(0.24.3)
|
|
utopic |
Not vulnerable
(0.24.3-0ubuntu1)
|
|
vivid |
Not vulnerable
(0.24.3-0ubuntu1)
|
|
wily |
Not vulnerable
(0.24.3-0ubuntu1)
|
|
xenial |
Not vulnerable
(0.24.3-0ubuntu1)
|
|
Patches: upstream: http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75 vendor: http://anonscm.debian.org/cgit/pkg-freedesktop/poppler.git/tree/debian/patches/upstream_Allow-only-one-d-in-the-filename.diff?id=03dc7c0c4ab7d792eecbd94234e1b46f2fbcf6c9 |
||
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. |