DescriptionThe FoFiType1::parse function in fofi/ in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)stretch0.48.0-2+deb9u2fixed
stretch (security)0.48.0-2+deb9u3fixed
bullseye, sid20.09.0-2fixed
swftools (PTS)stretch0.9.2+git20130725-4.1fixed
xpdf (PTS)stretch3.04-4fixed
buster, sid3.04-13fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


was silently fixed by upstream xpdf, fix propagated to poppler in 4b4fc5c017b/2005-09-14
but at least version 0.4.5 does *not* contain the ship.
Was fixed somewhere between 0.4.5 and 0.5.1

Search for package or bug name: Reporting problems