Vulnerability Details : CVE-2019-9543
An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2019-9543
- cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-9543
0.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9543
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-9543
-
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9543
-
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
CVE-2019-9543: Recursive function call in function JBIG2Stream::readGenericBitmap() – poppler 0.74.0 - Loginsoft ResearchThird Party Advisory
-
https://gitlab.freedesktop.org/poppler/poppler/issues/730
recursive function call in function JBIG2Stream::readGenericBitmap() (#730) · Issues · poppler / poppler · GitLabExploit;Third Party Advisory
-
http://www.securityfocus.com/bid/107238
Poppler CVE-2019-9543 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Jump to