CVE-2013-1788

Publication date 28 February 2013

Last updated 24 July 2024


Ubuntu priority

poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.

Read the notes from the security team

Status

Package Ubuntu Release Status
poppler 12.10 quantal
Fixed 0.20.4-0ubuntu1.2
12.04 LTS precise
Fixed 0.18.4-1ubuntu3.1
11.10 oneiric
Fixed 0.16.7-2ubuntu2.1
10.04 LTS lucid
Fixed 0.12.4-0ubuntu5.3
8.04 LTS hardy Ignored end of life

Notes


mdeslaur

reproducers: 1150.pdf.asan.8.69, 2030.pdf.asan.69.463, 1091.pdf.asan.72.42, 1036.pdf.asan.23.17

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
poppler