This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within PdfEncoding::ParseToUnicode. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5673.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libpodofo-dev", "binary_version": "0.9.6+dfsg-5" }, { "binary_name": "libpodofo-utils", "binary_version": "0.9.6+dfsg-5" }, { "binary_name": "libpodofo-utils-dbgsym", "binary_version": "0.9.6+dfsg-5" }, { "binary_name": "libpodofo0.9.6", "binary_version": "0.9.6+dfsg-5" }, { "binary_name": "libpodofo0.9.6-dbgsym", "binary_version": "0.9.6+dfsg-5" } ] }