Vulnerability Details : CVE-2022-38171
Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).
Vulnerability category: Overflow
Products affected by CVE-2022-38171
- cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
- cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-38171
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-38171
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-38171
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-38171
-
https://dl.xpdfreader.com/xpdf-4.04.tar.gz
Vendor Advisory
-
https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md
Vulnerabilities/CVE-2022-38171.md at main · zmanion/Vulnerabilities · GitHubPatch;Third Party Advisory
-
https://github.com/jeffssh/CVE-2021-30860
GitHub - jeffssh/CVE-2021-30860: Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finishedThird Party Advisory
-
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code ExecutionThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/09/02/11
oss-security - JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0Mailing List;Third Party Advisory
-
https://www.cve.org/CVERecord?id=CVE-2021-30860
CVE Record | CVEThird Party Advisory
-
http://www.xpdfreader.com/security-fixes.html
Xpdf Security FixesVendor Advisory
Jump to