Vulnerability Details : CVE-2017-7511
poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
Vulnerability category: Memory Corruption
Products affected by CVE-2017-7511
- cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.53.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.54.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.52.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.45.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.44.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.37.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.36.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.28.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.25.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.25.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.55.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.47.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.46.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.38.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.30.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.49.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.48.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.41.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.40.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.33.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.32.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.29.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.22.5:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.3:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.5:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.24.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.51.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.50.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.43.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.42.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.35.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.34.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.5:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.26.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.25.1:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:poppler:0.25.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7511
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-7511
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-7511
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2017-7511
-
https://cgit.freedesktop.org/poppler/poppler/commit/?id=5c9b08a875b07853be6c44e43ff5f7f059df666a
poppler/poppler - The poppler pdf rendering library (mirrored from https://gitlab.freedesktop.org/poppler/poppler)Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/201801-17
Poppler: Multiple vulnerabilities (GLSA 201801-17) — Gentoo security
Jump to