SUSE SLES12 Security Update : poppler (SUSE-SU-2022:1723-1)

critical Nessus Plugin ID 161367

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:1723-1 advisory.

- An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc. (CVE-2019-10871)

- An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function Splash::blitTransparent at splash/Splash.cc. (CVE-2019-10872)

- An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc. (CVE-2019-14494)

- In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo. (CVE-2019-7310)

- Poppler 0.74.0 has a heap-based buffer over-read in the CairoRescaleBox.cc downsample_row_box_filter function. (CVE-2019-9631)

- PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. (CVE-2019-9903)

- The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. (CVE-2019-9959)

- A flaw was found in Poppler in the way certain PDF files were converted into HTML. A remote attacker could exploit this flaw by providing a malicious PDF file that, when processed by the 'pdftohtml' program, would crash the application causing a denial of service. (CVE-2020-27778)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1124150

https://bugzilla.suse.com/1129202

https://bugzilla.suse.com/1130229

https://bugzilla.suse.com/1131696

https://bugzilla.suse.com/1131722

https://bugzilla.suse.com/1142465

https://bugzilla.suse.com/1143950

https://bugzilla.suse.com/1179163

https://www.suse.com/security/cve/CVE-2019-10871

https://www.suse.com/security/cve/CVE-2019-10872

https://www.suse.com/security/cve/CVE-2019-14494

https://www.suse.com/security/cve/CVE-2019-7310

https://www.suse.com/security/cve/CVE-2019-9631

https://www.suse.com/security/cve/CVE-2019-9903

https://www.suse.com/security/cve/CVE-2019-9959

https://www.suse.com/security/cve/CVE-2020-27778

http://www.nessus.org/u?edecebce

Plugin Details

Severity: Critical

ID: 161367

File Name: suse_SU-2022-1723-1.nasl

Version: 1.5

Type: local

Agent: unix

Published: 5/19/2022

Updated: 7/13/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-9631

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:libpoppler-glib8, p-cpe:/a:novell:suse_linux:libpoppler-cpp0, p-cpe:/a:novell:suse_linux:typelib-1_0-poppler-0_18, p-cpe:/a:novell:suse_linux:libpoppler-devel, p-cpe:/a:novell:suse_linux:libpoppler-qt4-devel, p-cpe:/a:novell:suse_linux:poppler-tools, p-cpe:/a:novell:suse_linux:libpoppler-glib-devel, p-cpe:/a:novell:suse_linux:libpoppler60, p-cpe:/a:novell:suse_linux:libpoppler-qt4-4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2022

Vulnerability Publication Date: 2/2/2019

Reference Information

CVE: CVE-2019-10871, CVE-2019-10872, CVE-2019-14494, CVE-2019-7310, CVE-2019-9631, CVE-2019-9903, CVE-2019-9959, CVE-2020-27778

SuSE: SUSE-SU-2022:1723-1