Glyphandcog

Xpdfreader

53 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.3%
  • Veröffentlicht 04.07.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in SampledFunction::transform in Function.cc when using a large index for samples. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows ...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 04.07.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, a heap-based buffer overflow could be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacke...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 25.06.2019 00:15:09
  • Zuletzt bearbeitet 21.11.2024 04:23:53

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in FoFiType1C::convertToType0 in fofi/FoFiType1C.cc when it is trying to access the second privateDicts array element, because the privateDicts array has only one element allocated.

Exploit
  • EPSS 0.3%
  • Veröffentlicht 25.06.2019 00:15:09
  • Zuletzt bearbeitet 21.11.2024 04:23:53

In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdfto...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 02.06.2019 00:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:00

There is an out-of-bounds read vulnerability in the function FlateStream::getChar() located at Stream.cc in Xpdf 4.01.01. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause In...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 31.05.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:57

A stack-based buffer over-read exists in PostScriptFunction::transform in Function.cc in Xpdf 4.01.01 because GfxSeparationColorSpace and GfxDeviceNColorSpace mishandle tint transform functions. It can, for example, be triggered by sending a crafted ...

  • EPSS 0.36%
  • Veröffentlicht 27.05.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:40

A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause D...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 06.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:54

There is a NULL pointer dereference vulnerability in PSOutputDev::setupResources() located in PSOutputDev.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdftops binary. It allows an attacker to cause Denial of...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 06.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:54

There is an Invalid memory access in gAtomicIncrement() located at GMutex.h in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdftops binary. It allows an attacker to cause Denial of Service (Segmentation fault) or ...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 06.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:54

There is a stack consumption issue in md5Round1() located in Decrypt.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or po...