Bug 859427 (CVE-2013-7296) - VUL-0: CVE-2013-7296: poppler: DoS due to a format string error
Summary: VUL-0: CVE-2013-7296: poppler: DoS due to a format string error
Status: RESOLVED FIXED
Alias: CVE-2013-7296
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Bjørn Lie
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-20 09:35 UTC by Alexander Bergmann
Modified: 2014-07-02 10:02 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-01-20 09:35:09 UTC
CVE-2013-7296

Agostino Sarubbo via Gentoo Bugzilla:

A vulnerability has been reported in Poppler, which can be exploited by malicious people to cause a DoS 
(Denial of Service) in an application using the library.

The vulnerability is caused due to a format string error when handling extraneous bytes within a segment 
in the "JBIG2Stream::readSegments()" method (JBIG2Stream.cc), which can be exploited to cause a crash.

- fixed in poppler 0.24.5

Fix:
http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.24&id=58e04a08afee39370283c494ee2e4e392fd3b684

References:
https://bugs.gentoo.org/show_bug.cgi?id=496770
http://comments.gmane.org/gmane.comp.security.oss.general/11878
https://bugs.kde.org/show_bug.cgi?id=328511
http://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee
https://bugzilla.redhat.com/show_bug.cgi?id=1048199
Comment 2 Swamp Workflow Management 2014-01-21 23:00:22 UTC
bugbot adjusting priority
Comment 3 Bjørn Lie 2014-01-22 15:43:56 UTC
https://build.opensuse.org/request/show/214720
Comment 4 Sebastian Krahmer 2014-01-22 15:47:14 UTC
.
Comment 5 Swamp Workflow Management 2014-02-03 15:24:42 UTC
openSUSE-SU-2014:0185-1: An update that fixes one vulnerability is now available.

Category: security (low)
Bug References: 859427
CVE References: CVE-2013-7296
Sources used:
openSUSE 13.1 (src):    poppler-0.24.3-4.1, poppler-qt-0.24.3-4.1
openSUSE 12.3 (src):    poppler-0.22.1-1.4.1, poppler-qt-0.22.1-1.4.1
Comment 6 Swamp Workflow Management 2014-02-19 11:04:32 UTC
openSUSE-SU-2014:0255-1: An update that fixes four vulnerabilities is now available.

Category: security (low)
Bug References: 806793,859427
CVE References: CVE-2013-1788,CVE-2013-1789,CVE-2013-1790,CVE-2013-7296
Sources used:
openSUSE 11.4 (src):    poppler-0.14.4-13.1
Comment 7 Bjørn Lie 2014-03-20 16:43:13 UTC
Released
Comment 8 Marcus Meissner 2014-07-02 10:02:42 UTC
segExtraBytes is "int" in SLE11 poppler, so its not affected.