SB2017070707 - Ubuntu update for poppler
Published: July 7, 2017 Updated: July 12, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2017-2820)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exist due to integer overflow in the JPEG 2000 image parsing functionality when handling malicious data. A remote attacker can send a specially crafted PDF file, trick the victim into opening it, trigger out of bounds memory overwrite on the heap and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Null pointer dereference (CVE-ID: CVE-2017-7511)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to NULL pointer dereference in the pdfunite when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
3) Uncontrolled recursion (CVE-ID: CVE-2017-7515)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to uncontrolled recursion in pdfunite when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
4) Null pointer dereference (CVE-ID: CVE-2017-9083)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc when handling malicious content. A remote attacker can send specially crafted PDF file, trick the victim into opening it, trigger segmentation fault and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
5) Memory leak (CVE-ID: CVE-2017-9406)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory leak in the function gmalloc in gmem.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
6) Memory leak (CVE-ID: CVE-2017-9408)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory leak in the function Object::initArray in Object.cc when handling malicious content. A remote attacker can send specially crafted file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
7) Stack-based buffer overflow (CVE-ID: CVE-2017-9775)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing PDF files within GfxState.cc in pdftocairo in Poppler before 0.56. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.