MGASA-2013-0332

Source
https://advisories.mageia.org/MGASA-2013-0332.html
Import Source
https://advisories.mageia.org/MGASA-2013-0332.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0332
Related
Published
2013-11-20T20:28:35Z
Modified
2013-11-20T20:28:32Z
Summary
Updated poppler packages fix multiple vulnerabilities
Details

Updated poppler packages fix security vulnerabilities:

Poppler is found to be affected by a stack based buffer overflow vulnerability in the pdfseparate utility. Successfully exploiting this issue could allow remote attackers to execute arbitrary code in the context of the affected application. Failed exploits may result in denial-of-service conditions (CVE-2013-4473).

Poppler was found to have a user controlled format string vulnerability because it fails to sanitize user-supplied input. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition (CVE-2013-4474).

References
Credits

Affected packages

Mageia:2 / poppler

Package

Name
poppler
Purl
pkg:rpm/mageia/poppler?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.18.4-2.3.mga2

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / poppler

Package

Name
poppler
Purl
pkg:rpm/mageia/poppler?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.22.1-1.1.mga3

Ecosystem specific

{
    "section": "core"
}