Debian dla-3120 : gir1.2-poppler-0.18 - security update

high Nessus Plugin ID 165449

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3120 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-3120-1 [email protected] https://www.debian.org/lts/security/ Markus Koschany September 26, 2022 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : poppler Version : 0.71.0-5+deb10u1 CVE ID : CVE-2018-18897 CVE-2018-19058 CVE-2018-20650 CVE-2019-9903 CVE-2019-9959 CVE-2019-14494 CVE-2020-27778 CVE-2022-27337 CVE-2022-38784 Debian Bug : 913164 913177 917974 925264 941776 933812 1010695 1018971

Several security vulnerabilities have been discovered in Poppler, a PDF rendering library, that could lead to denial of service or possibly other unspecified impact when processing maliciously crafted documents.

For Debian 10 buster, these problems have been fixed in version 0.71.0-5+deb10u1.

We recommend that you upgrade your poppler packages.

For the detailed security status of poppler please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/poppler

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: This is a digitally signed message part

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the gir1.2-poppler-0.18 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/poppler

https://security-tracker.debian.org/tracker/CVE-2018-18897

https://security-tracker.debian.org/tracker/CVE-2018-19058

https://security-tracker.debian.org/tracker/CVE-2018-20650

https://security-tracker.debian.org/tracker/CVE-2019-14494

https://security-tracker.debian.org/tracker/CVE-2019-9903

https://security-tracker.debian.org/tracker/CVE-2019-9959

https://security-tracker.debian.org/tracker/CVE-2020-27778

https://security-tracker.debian.org/tracker/CVE-2022-27337

https://security-tracker.debian.org/tracker/CVE-2022-38784

https://packages.debian.org/source/buster/poppler

Plugin Details

Severity: High

ID: 165449

File Name: debian_DLA-3120.nasl

Version: 1.8

Type: local

Agent: unix

Published: 9/26/2022

Updated: 1/22/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2020-27778

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-38784

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libpoppler-private-dev, p-cpe:/a:debian:debian_linux:poppler-utils, p-cpe:/a:debian:debian_linux:libpoppler-cpp-dev, p-cpe:/a:debian:debian_linux:libpoppler-glib-doc, p-cpe:/a:debian:debian_linux:libpoppler-qt5-1, p-cpe:/a:debian:debian_linux:libpoppler-dev, p-cpe:/a:debian:debian_linux:libpoppler-cpp0v5, p-cpe:/a:debian:debian_linux:gir1.2-poppler-0.18, p-cpe:/a:debian:debian_linux:libpoppler-glib8, p-cpe:/a:debian:debian_linux:libpoppler-qt5-dev, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:libpoppler-glib-dev, p-cpe:/a:debian:debian_linux:libpoppler82

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/26/2022

Vulnerability Publication Date: 11/2/2018

Reference Information

CVE: CVE-2018-18897, CVE-2018-19058, CVE-2018-20650, CVE-2019-14494, CVE-2019-9903, CVE-2019-9959, CVE-2020-27778, CVE-2022-27337, CVE-2022-38784

IAVB: 2022-B-0039-S, 2022-B-0050-S