Description
The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
References (4)
Core 4
Core References
Patch, Vendor Advisory x_refsource_confirm
https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4079
Exploit, Issue Tracking, VDB Entry, Vendor Advisory x_refsource_confirm
https://bugzilla.freedesktop.org/show_bug.cgi?id=102724
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html
Scores
CVSS v3
7.5
EPSS
0.0109
EPSS Percentile
78.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
7.0
debian/debian_linux
8.0
debian/debian_linux
9.0
freedesktop/poppler
0.59.0
Published
Oct 02, 2017
Tracked Since
Feb 18, 2026