CVE-2020-35702
Published: December 25, 2020Last modified: November 8, 2023
Description
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 7.8 | 
| Attack Vector | LOCAL | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | REQUIRED | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | poppler | Not affected (22.11.0-r0) | 
| Stream | poppler | Not affected (23.07.0-r0) |