Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 13 Feb 2009 11:20:40 +0200
From: Pinar Yanardag <pinar@...dus.org.tr>
To: oss-security@...ts.openwall.com
Subject: CVE Request: Poppler -Two Denial of Service Vulnerabilities

 From Secunia [1]:

--->8---
Two vulnerabilities have been reported in Poppler, which can be 
exploited by malicious people to cause a DoS (Denial of Service).

1) An uninitialised memory access error in the 
"FormWidgetChoice::loadDefaults()" function can be exploited to cause a 
crash via a specially crafted PDF document.

2) An error in the "JBIG2Stream::readSymbolDictSeg()" function can be 
exploited to cause a crash via a specially crafted PDF document.
--->8---

[1]: http://secunia.com/Advisories/33853

-- 
Pinar Yanardag
http://pinguar.org
_____________________________
Pardus Security Team
http://security.pardus.org.tr


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ