SUSE SLED15 / SLES15 Security Update : poppler (SUSE-SU-2021:3854-1)

critical Nessus Plugin ID 155796

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:3854-1 advisory.

- The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file, as demonstrated by pdftops.
(CVE-2017-18267)

- Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.
(CVE-2018-13988)

- In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack. (CVE-2018-16646)

- An issue was discovered in Poppler 0.71.0. There is a memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc, as demonstrated by pdftocairo. (CVE-2018-18897)

- An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file.
(CVE-2018-19058)

- An issue was discovered in Poppler 0.71.0. There is a out-of-bounds read in EmbFile::save2 in FileSpec.cc, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating embedded files before save attempts. (CVE-2018-19059)

- An issue was discovered in Poppler 0.71.0. There is a NULL pointer dereference in goo/GooString.h, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating a filename of an embedded file before constructing a save path. (CVE-2018-19060)

- Poppler before 0.70.0 has a NULL pointer dereference in _poppler_attachment_new when called from poppler_annot_file_attachment_get_attachment. (CVE-2018-19149)

- XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser::makeStream in Parser.cc. (CVE-2018-20481)

- A reachable Object::getString assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to construction of invalid rich media annotation assets in the AnnotRichMedia class in Annot.c.
(CVE-2018-20551)

- A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach. (CVE-2018-20650)

- In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubtype processing. (CVE-2018-20662)

- An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc. (CVE-2019-10871)

- An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function Splash::blitTransparent at splash/Splash.cc. (CVE-2019-10872)

- An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc. (CVE-2019-14494)

- In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo. (CVE-2019-7310)

- A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
(CVE-2019-9200)

- Poppler 0.74.0 has a heap-based buffer over-read in the CairoRescaleBox.cc downsample_row_box_filter function. (CVE-2019-9631)

- PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. (CVE-2019-9903)

- The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. (CVE-2019-9959)

- A flaw was found in Poppler in the way certain PDF files were converted into HTML. A remote attacker could exploit this flaw by providing a malicious PDF file that, when processed by the 'pdftohtml' program, would crash the application causing a denial of service. (CVE-2020-27778)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1092945

https://bugzilla.suse.com/1102531

https://bugzilla.suse.com/1107597

https://bugzilla.suse.com/1114966

https://bugzilla.suse.com/1115185

https://bugzilla.suse.com/1115186

https://bugzilla.suse.com/1115187

https://bugzilla.suse.com/1115626

https://bugzilla.suse.com/1120495

https://bugzilla.suse.com/1120496

https://bugzilla.suse.com/1120939

https://bugzilla.suse.com/1120956

https://bugzilla.suse.com/1124150

https://bugzilla.suse.com/1127329

https://bugzilla.suse.com/1129202

https://bugzilla.suse.com/1130229

https://bugzilla.suse.com/1131696

https://bugzilla.suse.com/1131722

https://bugzilla.suse.com/1142465

https://bugzilla.suse.com/1143950

https://bugzilla.suse.com/1179163

https://www.suse.com/security/cve/CVE-2017-18267

https://www.suse.com/security/cve/CVE-2018-13988

https://www.suse.com/security/cve/CVE-2018-16646

https://www.suse.com/security/cve/CVE-2018-18897

https://www.suse.com/security/cve/CVE-2018-19058

https://www.suse.com/security/cve/CVE-2018-19059

https://www.suse.com/security/cve/CVE-2018-19060

https://www.suse.com/security/cve/CVE-2018-19149

https://www.suse.com/security/cve/CVE-2018-20481

https://www.suse.com/security/cve/CVE-2018-20551

https://www.suse.com/security/cve/CVE-2018-20650

https://www.suse.com/security/cve/CVE-2018-20662

https://www.suse.com/security/cve/CVE-2019-10871

https://www.suse.com/security/cve/CVE-2019-10872

https://www.suse.com/security/cve/CVE-2019-14494

https://www.suse.com/security/cve/CVE-2019-7310

https://www.suse.com/security/cve/CVE-2019-9200

https://www.suse.com/security/cve/CVE-2019-9631

https://www.suse.com/security/cve/CVE-2019-9903

https://www.suse.com/security/cve/CVE-2019-9959

https://www.suse.com/security/cve/CVE-2020-27778

http://www.nessus.org/u?daf7711c

Plugin Details

Severity: Critical

ID: 155796

File Name: suse_SU-2021-3854-1.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/2/2021

Updated: 7/13/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-9631

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libpoppler73, p-cpe:/a:novell:suse_linux:libpoppler-glib8, p-cpe:/a:novell:suse_linux:libpoppler-cpp0, p-cpe:/a:novell:suse_linux:typelib-1_0-poppler-0_18, p-cpe:/a:novell:suse_linux:libpoppler-devel, p-cpe:/a:novell:suse_linux:poppler-tools, p-cpe:/a:novell:suse_linux:libpoppler-glib-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/1/2021

Vulnerability Publication Date: 5/10/2018

Reference Information

CVE: CVE-2017-18267, CVE-2018-13988, CVE-2018-16646, CVE-2018-18897, CVE-2018-19058, CVE-2018-19059, CVE-2018-19060, CVE-2018-19149, CVE-2018-20481, CVE-2018-20551, CVE-2018-20650, CVE-2018-20662, CVE-2019-10871, CVE-2019-10872, CVE-2019-14494, CVE-2019-7310, CVE-2019-9200, CVE-2019-9631, CVE-2019-9903, CVE-2019-9959, CVE-2020-27778

IAVB: 2018-B-0151-S, 2019-B-0001-S, 2019-B-0011-S, 2019-B-0021-S, 2019-B-0064-S

SuSE: SUSE-SU-2021:3854-1